Regular expression denial of service in Apache ShenYu
High severity
GitHub Reviewed
Published
May 18, 2022
to the GitHub Advisory Database
•
Updated Jul 11, 2023
Description
Published by the National Vulnerability Database
May 17, 2022
Published to the GitHub Advisory Database
May 18, 2022
Reviewed
May 25, 2022
Last updated
Jul 11, 2023
In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2 and is fixed in 2.4.3.
References