Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[core] Potential ReDoS Vulnerability or Inefficient Regular Expression in Project: Need for Assessment and Mitigation #44078

Closed
uniqueqidian opened this issue Oct 12, 2024 · 3 comments · Fixed by #44627
Assignees
Labels
core Infrastructure work going on behind the scenes performance

Comments

@uniqueqidian
Copy link

uniqueqidian commented Oct 12, 2024

Steps to reproduce

Hello,

I am writing to report a potential Regular Expression Denial of Service (ReDoS) vulnerability or Inefficient Regular Expression in the project. When using specially crafted input strings in the context, it may lead to extremely high CPU usage, application freezing, or denial of service attacks.

Location of Issue:

The vulnerability is related to a regular expression used in the following validation file, which may result in significantly prolonged execution times under certain conditions.

`{{"demo": "${demoOptions.demo.replace(/\.(.*)$/, '.js')}", …}}.`,

.replace(/<RootRef.*>/gm, '<>')

.replace(/\n?import.*core\/RootRef['"];?/gm, '')

const storageKey = content.match(/^<codeblock [^>]*storageKey=["|'](\S*)["|'].*>/m)?.[1];

PoC Files and Comparisons:

PoC_1.zip
PoC_2.zip
PoC_3.zip
PoC_4.zip

To evaluate the performance of this inefficient regular expression matching with varying input contents, the following commands can be executed within every PoC_i folder:

$ npm install # Install necessary dependencies for the minimal proof of concept environment.
$ time node poc.js # Run the script with maliciously constructed string and record the running time.
$ time node normal_string.js # Run the script with normal strings of same length and record the running time.

In the most severe case, on my machine, the maliciously crafted string took the following time, and caused CPU usage to reach 98% during program execution:

real    8m7.094s

However, a normal string of the same length only took the following time:

real    0m0.072s
user    0m0.040s
sys     0m0.024s

This reveals a significant efficiency problem with the regular expression used in the program under certain conditions.

Proposed Solution:

A simple strategy could be to limit the length of the string being matched by the regular expression, thereby preventing excessive time consumption during regex matching. To completely avoid the issue, the pathological part of the regular expression that causes catastrophic backtracking should be modified.

Background Information:

Here are some real-world examples of issues caused by ReDoS vulnerabilities:

  1. In 2019, Cloudflare experienced a service disruption lasting approximately 27 minutes due to a ReDoS vulnerability that allowed crafted input to overwhelm regex processing, resulting in significant performance degradation and temporary service outage (source: Cloudflare Incident Report).
  2. Stack Overflow was affected by a ReDoS vulnerability in 2016, causing multiple instances of service degradation and temporary outages of up to 34 minutes during peak traffic periods due to inefficient regular expression patterns (source: Stack Overflow Incident Report).

Thank you for your attention to this matter. Your evaluation and response to this potential security concern would be greatly appreciated.

Best regards,

Current behavior

No response

Expected behavior

No response

Context

No response

Your environment

No response

Search keywords: ReDoS

@uniqueqidian uniqueqidian added the status: waiting for maintainer These issues haven't been looked at yet by a maintainer label Oct 12, 2024
@mnajdova mnajdova added docs Improvements or additions to the documentation performance labels Oct 14, 2024
@samuelsycamore samuelsycamore removed their assignment Oct 14, 2024
@mnajdova
Copy link
Member

Thanks for the nice write up. Would you like to explore the changes by providing a PR? I wouldn't prioritize this as work fro the team, but we may accept a community PR if it solves an issue.

@mnajdova mnajdova removed the status: waiting for maintainer These issues haven't been looked at yet by a maintainer label Nov 15, 2024
@SuperMaxine
Copy link
Contributor

SuperMaxine commented Dec 2, 2024

Hi‌‌ @mnajdova! I worked on the PR #44627 for this issue recently, fixing the ReDoS problem mentioned in this issue and providing test cases for these ReDoS problems. It has passed all checks but still requires 'At least 1 approving review is required by reviewers with write access.' If there are any further needs, please contact me.

@mj12albert mj12albert changed the title Potential ReDoS Vulnerability or Inefficient Regular Expression in Project: Need for Assessment and Mitigation [core] Potential ReDoS Vulnerability or Inefficient Regular Expression in Project: Need for Assessment and Mitigation Dec 4, 2024
@mj12albert mj12albert added core Infrastructure work going on behind the scenes and removed docs Improvements or additions to the documentation labels Dec 4, 2024
Copy link

github-actions bot commented Dec 5, 2024

This issue has been closed. If you have a similar problem but not exactly the same, please open a new issue.
Now, if you have additional information related to this issue or things that could help future readers, feel free to leave a comment.

Note

@uniqueqidian How did we do? Your experience with our support team matters to us. If you have a moment, please share your thoughts in this short Support Satisfaction survey.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
core Infrastructure work going on behind the scenes performance
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants