-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is react-i18next vulnerable to CVE-2021-23346 ? #1275
Is react-i18next vulnerable to CVE-2021-23346 ? #1275
Comments
imo, thanks to the <0> wrapping the vulnerability has no effect to react-i18next's Trans component. |
@adrai would it be possible to switch to https://github.com/HenrikJoreteg/html-parse-stringify where this vulnerability has been fixed? |
if it includes everything html-parse-stringify2 has, probably yes... |
@mbochynski it seems that the linked repo is actually the original of |
feel free to try a PR |
I tried fixing this in #1283, but not much luck so far. Are there any alternatives to |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
bump |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Are there any news here, I imagine I am not the only one who is suffering from this |
@alon24 first of all, there is no real suffering, because this CVE seems not to affect react-i18next at runtime... |
🐛 Bug Report
Raising as an issue here as I'm not sure this makes sense to ask on SO
html-parse-stringify2@^2.0.1
.html-parse-stringify2
is still maintained and will ever be fixed (ongoing conversation in Regular Expression Denial of Service possible rayd/html-parse-stringify2#26).react-i18next/src/Trans.js
Line 136 in 9f80ddc
html-parse-stringify2
is used, where the string to be parsed is explicitly wrapped in<0>${interpolatedString}</0>
${interpolatedString}
that triggers the ReDoS bug inhtml-parse-stringify2
, and looking at the bug in the RegEx inhtml-parse-stringify2
I'm pretty sure there isn't one, but would like an official view from the maintainers on whether CVE-2021-23346 is definitely not applicable.To Reproduce
If you want to see the bug in
html-parse-stringify2
then run...This does not complete in a timely manner.
Running the following does complete quickly, but maybe I just can't think of a "bad" input yet.
Expected behavior
Hopefully you confirm this is not applicable
Your Environment
The text was updated successfully, but these errors were encountered: