Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fast-xml-parser vulnerable to ReDOS at currency parsing #39

Closed
jussivuo opened this issue Aug 5, 2024 · 0 comments
Closed

fast-xml-parser vulnerable to ReDOS at currency parsing #39

jussivuo opened this issue Aug 5, 2024 · 0 comments

Comments

@jussivuo
Copy link

jussivuo commented Aug 5, 2024

fast-xml-parser is vulnerable to ReDOS at currency parsing. This issue is patched on version: 4.4.1.
Could you please update the used fast-xml-parser version.

Summary
A ReDOS exists on currency.js was discovered by Gauss Security Labs R&D team.

Details
https://github.com/NaturalIntelligence/fast-xml-parser/blob/master/src/v5/valueParsers/currency.js#L10
contains a vulnerable regex

PoC
pass the following string '\t'.repeat(13337) + '.'

Impact
Denial of service during currency parsing in experimental version 5 of fast-xml-parser-library
https://gauss-security.com/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant