← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1951983] Re: nova contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service).

 

Thanks for confirming. I've switched the report to a normal public bug
and marked our security advisory task as inapplicable, since this
doesn't represent any exploitable vulnerability in the project. At
worst, a developer could cherry-pick a malicious proposed change for the
source and consume lots of CPU running static analysis checking on it
until they interrupted the process.

** Information type changed from Private Security to Public

** Description changed:

- This issue is being treated as a potential security risk under
- embargo. Please do not make any public mention of embargoed
- (private) security vulnerabilities before their coordinated
- publication by the OpenStack Vulnerability Management Team in the
- form of an official OpenStack Security Advisory. This includes
- discussion of the bug or associated fixes in public forums such as
- mailing lists, code review systems and bug trackers. Please also
- avoid private disclosure to other individuals not already approved
- for access to this information, and provide this same reminder to
- those who are made aware of the issue prior to publication. All
- discussion should remain confined to this private bug report, and
- any proposed fixes should be added to the bug as attachments. This
- embargo shall not extend past 2022-02-21 and will be made
- public by or on that date even if no fix is identified.
- 
- 
  # Summary
  nova contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service).
  
  # Description
  
  ReDoS, or Regular Expression Denial of Service, is a vulnerability
  affecting inefficient regular expressions which can perform extremely
  badly when run on a crafted input string.
  
  # Proof of Concept
  To see that the regular expression is vulnerable, copy-paste it into a separate file & run the code as shown in below.
  
  ```python
  import re
  
  log_remove_context = re.compile(
      r"(.)*LOG\.(.*)\(.*(context=[_a-zA-Z0-9].*)+.*\)")
  log_remove_context.match('LOG.' + '(' * 3456)
  ```
  
  # Impact
  This issue may lead to a denial of service.
  
  # References
  - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS

** Changed in: ossa
       Status: Incomplete => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1951983

Title:
  nova contains a regular expression that is vulnerable to ReDoS
  (Regular Expression Denial of Service).

Status in OpenStack Compute (nova):
  New
Status in OpenStack Security Advisory:
  Won't Fix

Bug description:
  # Summary
  nova contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service).

  # Description

  ReDoS, or Regular Expression Denial of Service, is a vulnerability
  affecting inefficient regular expressions which can perform extremely
  badly when run on a crafted input string.

  # Proof of Concept
  To see that the regular expression is vulnerable, copy-paste it into a separate file & run the code as shown in below.

  ```python
  import re

  log_remove_context = re.compile(
      r"(.)*LOG\.(.*)\(.*(context=[_a-zA-Z0-9].*)+.*\)")
  log_remove_context.match('LOG.' + '(' * 3456)
  ```

  # Impact
  This issue may lead to a denial of service.

  # References
  - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1951983/+subscriptions