v8n vulnerable to Inefficient Regular Expression Complexity
Description
Published by the National Vulnerability Database
Aug 2, 2022
Published to the GitHub Advisory Database
Oct 7, 2022
Reviewed
Oct 7, 2022
Last updated
Jul 31, 2023
Impact
Inefficient regular expression complexity of
lowercase()
anduppercase()
regex could lead to a denial of service attack. With a formed payload'a' + 'a'.repeat(i) + 'A'
, only 32 characters payload could take 29443 ms time execution when testinglowercase()
. The same issue happens withuppercase()
.Patches
v1.5.1
References
huntr.dev report
Regular Expression Denial of Service (ReDoS) and Catastrophic Backtracking
For more information
If you have any questions or comments about this advisory:
References