Regular Expression Denial of Service in Acorn
High severity
GitHub Reviewed
Published
Apr 3, 2020
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Package
Affected versions
>= 6.0.0, < 6.4.1
>= 7.0.0, < 7.1.1
>= 5.5.0, < 5.7.4
Patched versions
6.4.1
7.1.1
5.7.4
Description
Reviewed
Apr 3, 2020
Published to the GitHub Advisory Database
Apr 3, 2020
Last updated
Jan 9, 2023
Affected versions of acorn are vulnerable to Regular Expression Denial of Service.
A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop.
The string is not valid UTF16 which usually results in it being sanitized before reaching the parser.
If an application processes untrusted input and passes it directly to acorn,
attackers may leverage the vulnerability leading to Denial of Service.
References