Skip to content

Conversation

@jorgectf
Copy link
Contributor

@jorgectf jorgectf commented Apr 2, 2021

The fact of not sanitizing user input appended to a regular expression may lead to a Regular Expression Denial of Service by an attacker crafting a regular expression taking too much to load, or simply change the behaviour of the program.

Vulnerable code:

query = re.compile(query)

References:

OWASP ReDoS

@doomedraven
Copy link
Collaborator

Gracias tio

@doomedraven doomedraven merged commit 9ee1e74 into kevoreilly:master Apr 2, 2021
@jorgectf jorgectf deleted the fix-regex-injection branch April 2, 2021 19:45
@kevoreilly
Copy link
Owner

Thank you jorge!

kfirstri pushed a commit to intezer/CAPEv2 that referenced this pull request Jun 21, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants