-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerable Regular Expression in vfsjfilechooser2 #7
Comments
This project hasn't been under active development for a number of years (I no longer use it). Propose a patch that mitigates the problem and I'll have a look at it. |
I am willing to suggest that you replace the Pattern p_ftp2 Similarly, Pattern p_ftp3 can also be modified in this way. Feel free to contact me if you have any questions on these vulnerability disclosures :). |
…eDoS), see #7 passwords can now also contain special characters (eg :), which have to be URL encoded (ie %3A)
Thanks for that. Tested and incorporated the fix. Also fixed handling of specials chars in passwords, which need to be URL encoded. Pushed out a new release (0.2.9) to Maven Central. |
Hi, Was CVE-2021-29061 fixed? Thanks!! |
0.2.9 as it says in the comment before your comment. |
Type of Issue
Potential Regex Denial of Service (ReDoS)
Description
The vulnerable regular expression is located in
vfsjfilechooser2/src/main/java/com/googlecode/vfsjfilechooser2/utils/VFSURIValidator.java
Line 235 in 5a5f348
The ReDOS vulnerability can be exploited with the following string
ftp://:@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::
You can execute the following code to reproduce ReDos
I think you can limit the input length or modify this regex.
The text was updated successfully, but these errors were encountered: