-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[VULNERABILITY] Parsing a long String will result in 100% CPU usage and String.test
will never finish
#70
Comments
String.test
will never finishString.test
will never finish
String.test
will never finishString.test
will never finish
I think the solution might be to use this https://github.com/uhop/node-re2/ |
I've confirmed that using RE2 package resolves this issue. You may want to incorporate or suggest in the docs @sindresorhus for |
I second addressing this issue. I'm hitting this periodically. |
|
This was discovered per my research and development with https://forwardemail.net, https://github.com/spamscanner/spamscanner, and https://github.com/ladjs. |
Hi, We have internally assigned a CVE to this vulnerability and will be looking to publish it in our public database in the next 24 hours - if any of the maintainers wish to reach out to us and discuss or wish for us to wait - please do reach out either here or to our disclosure email [email protected], as we would be very happy to discuss with the maintainer team before publishing. George, |
url-regex has a security vulnerability. is-url-superb uses native URL api to verify text is a valid url. much cleaner. ref: GHSA-v4rh-8p82-6h5w kevva/url-regex#70
url-regex has a security vulnerability. is-url-superb uses native URL api to verify text is a valid url. much cleaner. ref: GHSA-v4rh-8p82-6h5w kevva/url-regex#70
Addresses security vulnerability described at kevva/url-regex#70
Addresses security vulnerability described at kevva/url-regex#70
any update on this? |
unfortunately, I think the project is dead |
I think PRs are welcome, but the project is no longer actively maintained |
This issue is fixed in my maintained and modern version of this package at https://github.com/niftylettuce/url-regex-safe. You should be able to switch from |
The package [url-regex](https://www.npmjs.com/package/url-regex) has a [Regular Expression Denial of Service vulnerability](https://www.npmjs.com/advisories/1550) and it looks like it is [not maintained anymore](kevva/url-regex#70). This PR replaces url-regex with [url-regex-safe](https://www.npmjs.com/package/url-regex-safe) which solves the problem above while providing a drop-in replacement for url-regex.
* fix: Use url-regex-safe to fix url-regex vulnerability The package [url-regex](https://www.npmjs.com/package/url-regex) has a [Regular Expression Denial of Service vulnerability](https://www.npmjs.com/advisories/1550) and it looks like it is [not maintained anymore](kevva/url-regex#70). This PR replaces url-regex with [url-regex-safe](https://www.npmjs.com/package/url-regex-safe) which solves the problem above while providing a drop-in replacement for url-regex. * Update package.json Co-authored-by: Kiko Beats <[email protected]>
IMPORTANT UPDATE (8/15/20)
Per my comment below, I have released my own package,
url-regex-safe
, which resolves this issue, and all (solvable) existing issues and pull requests here in this GitHub repository. The new package has 100% test coverage and is available at https://github.com/niftylettuce/url-regex-safe. It has more sensible defaults as well.Example:
The only way to exit out is to SIGINT.
The text was updated successfully, but these errors were encountered: