You are viewing a plain text version of this content. The canonical link for it is here.
Posted to announce@apache.org by Zhang Yonglun <zh...@apache.org> on 2022/05/17 05:52:49 UTC
CVE-2022-26650: Apache ShenYu (incubating) Regular expression denial of service
Severity: moderate
Description:
In ShenYu-Bootstrap there's RegexPredicateJudge.java which uses
Pattern.matches(conditionData.getParamValue(), realData) to make
judgments, where both parameters are controllable by the user. This
can cause an attacker pass in malicious regular expressions and
characters causing a resource exhaustion.
This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2.
Mitigation:
Upgrade to Apache ShenYu (incubating) 2.4.3 or apply patch
https://github.com/apache/incubator-shenyu/pull/2975.
--
Zhang Yonglun
Apache ShenYu (Incubating)
Apache ShardingSphere
Re: CVE-2022-26650: Apache ShenYu (incubating) Regular expression denial of service
Posted by Zhang Yonglun <zh...@apache.org>.
Add credit.
Severity: moderate
Description:
In ShenYu-Bootstrap there's RegexPredicateJudge.java which uses
Pattern.matches(conditionData.getParamValue(), realData) to make
judgments, where both parameters are controllable by the user. This
can cause an attacker pass in malicious regular expressions and
characters causing a resource exhaustion.
This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2.
Mitigation:
Upgrade to Apache ShenYu (incubating) 2.4.3 or apply patch
https://github.com/apache/incubator-shenyu/pull/2975.
Credit:
Apache ShenYu would like to thank Lai Han of NSFOCUS security team
for reporting this issue.
--
Zhang Yonglun
Apache ShenYu (Incubating)
Apache ShardingSphere
Zhang Yonglun <zh...@apache.org> 于2022年5月17日周二 13:52写道:
>
> Severity: moderate
>
> Description:
>
> In ShenYu-Bootstrap there's RegexPredicateJudge.java which uses
> Pattern.matches(conditionData.getParamValue(), realData) to make
> judgments, where both parameters are controllable by the user. This
> can cause an attacker pass in malicious regular expressions and
> characters causing a resource exhaustion.
> This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2.
>
> Mitigation:
>
> Upgrade to Apache ShenYu (incubating) 2.4.3 or apply patch
> https://github.com/apache/incubator-shenyu/pull/2975.
>
> --
>
> Zhang Yonglun
> Apache ShenYu (Incubating)
> Apache ShardingSphere
Re: CVE-2022-26650: Apache ShenYu (incubating) Regular expression denial of service
Posted by Zhang Yonglun <zh...@apache.org>.
Add credit.
Severity: moderate
Description:
In ShenYu-Bootstrap there's RegexPredicateJudge.java which uses
Pattern.matches(conditionData.getParamValue(), realData) to make
judgments, where both parameters are controllable by the user. This
can cause an attacker pass in malicious regular expressions and
characters causing a resource exhaustion.
This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2.
Mitigation:
Upgrade to Apache ShenYu (incubating) 2.4.3 or apply patch
https://github.com/apache/incubator-shenyu/pull/2975.
Credit:
Apache ShenYu would like to thank Lai Han of NSFOCUS security team
for reporting this issue.
--
Zhang Yonglun
Apache ShenYu (Incubating)
Apache ShardingSphere
Zhang Yonglun <zh...@apache.org> 于2022年5月17日周二 13:52写道:
>
> Severity: moderate
>
> Description:
>
> In ShenYu-Bootstrap there's RegexPredicateJudge.java which uses
> Pattern.matches(conditionData.getParamValue(), realData) to make
> judgments, where both parameters are controllable by the user. This
> can cause an attacker pass in malicious regular expressions and
> characters causing a resource exhaustion.
> This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2.
>
> Mitigation:
>
> Upgrade to Apache ShenYu (incubating) 2.4.3 or apply patch
> https://github.com/apache/incubator-shenyu/pull/2975.
>
> --
>
> Zhang Yonglun
> Apache ShenYu (Incubating)
> Apache ShardingSphere