Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Regular Expression DoS vulnerabilities in plugins/importers/dart.py #1597

Closed
yinxiL opened this issue May 29, 2020 · 3 comments
Closed

Regular Expression DoS vulnerabilities in plugins/importers/dart.py #1597

yinxiL opened this issue May 29, 2020 · 3 comments

Comments

@yinxiL
Copy link

yinxiL commented May 29, 2020

We are working on the ReDoS problem and detected a vulnerable regex from your code.

^\s*([\w_]+\s*)+\( in link takes forever to match the string
"0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000\b"
We suggest you change the structure ([\w_]+\s*)+, to [\w_][\w_\s]*.

We didn’t create a pull request because we're not sure if this case is possible to take place in your program, we also do not understand the functionality of the regex as you do. Thank you for your understanding.

vitalije added a commit that referenced this issue May 29, 2020
@edreamleo
Copy link
Member

@IncyLiu Thanks for this report. The things we never dream of...

@vitalije Thanks for the fix.

@abergmann
Copy link

CVE-2020-23478 was assigned to this issue.

@edreamleo
Copy link
Member

edreamleo commented Sep 23, 2021

@abergmann Thanks for this update.

I fail to understand why this is a problem.

In order to execute the supposedly problematic regex, the "attacker" would have to get Leo to import a dart file. If the attacker can do that, they could just as easily wipe the hard drive.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants