Skip to content

ReDos in content type parsing (2nd degree polynomial)

Low
tenderlove published GHSA-22f2-v57c-j9cx Feb 28, 2024

Package

bundler rack (RubyGems)

Affected versions

>= 0.4

Patched versions

3.0.9.1, 2.2.8.1

Description

Summary

module Rack
  class MediaType
    SPLIT_PATTERN = %r{\s*[;,]\s*}

The above regexp is subject to ReDos. 50K blank characters as a prefix to the header will take over 10s to split.

PoC

A simple HTTP request with lots of blank characters in the content-type header:

request["Content-Type"] = (" " * 50_000) + "a,"

Impact

It's a very easy to craft ReDos. Like all ReDos the impact is debatable.

Severity

Low

CVE ID

CVE-2024-25126

Weaknesses

No CWEs

Credits