Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix Regular Expression injection #473

Merged
merged 1 commit into from Apr 2, 2021
Merged

Fix Regular Expression injection #473

merged 1 commit into from Apr 2, 2021

Conversation

jorgectf
Copy link
Contributor

@jorgectf jorgectf commented Apr 2, 2021

The fact of not sanitizing user input appended to a regular expression may lead to a Regular Expression Denial of Service by an attacker crafting a regular expression taking too much to load, or simply change the behaviour of the program.

Vulnerable code:

query = re.compile(query)

References:

OWASP ReDoS

@doomedraven
Copy link
Collaborator

Gracias tio

@doomedraven doomedraven merged commit 9ee1e74 into kevoreilly:master Apr 2, 2021
@jorgectf jorgectf deleted the fix-regex-injection branch April 2, 2021 19:45
@kevoreilly
Copy link
Owner

Thank you jorge!

kfirstri pushed a commit to intezer/CAPEv2 that referenced this pull request Jun 21, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants