-
Notifications
You must be signed in to change notification settings - Fork 265
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limit str to 100 to avoid ReDoS of 0.3s #89
Conversation
Sweet! Thank you. 😊 |
Hey @leo! |
Sad that module authors does not care about performance at all. |
@karenyavine It was just released with version 2.0.0! 🎉 |
@leo, thanks for the fix and the release. |
Because we lowered the limit. So if people have longer strings in place, it will break. |
+1 on @Delagen's solution. Both the previous fix of limiting to 10000 chars, and the new one of limiting to 100 chars were merely a workaround. |
Snyk notoriously reports on the ms package used by socket.io, which actually is no vulnerability, and the author rejected snyk's fix. It looks bad on the README, so removing snyk until they fix their attitude.
Hey,
The fix for CVE-2015-8315 was incomplete. Limiting the input to 10,000 chars reduced the risk significantly but it is still possible to cause a delay of 0.3s. Suggested to limit it to 100 chars as there is no reason for a date to be over that :)
PoC:
Thanks,
Karen Yavine
Security Analyst @ snyk.io