zulip zulip 未加控制的资源消耗(资源穷尽)

admin 2023-11-30 19:27:03 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
zulip zulip 未加控制的资源消耗(资源穷尽)

CVE编号

CVE-2021-41115

利用情况

暂无

补丁情况

N/A

披露时间

2021-10-08
漏洞描述
Zulip is an open source team chat server. In affected versions Zulip allows organization administrators on a server to configure "linkifiers" that automatically create links from messages that users send, detected via arbitrary regular expressions. Malicious organization administrators could subject the server to a denial-of-service via regular expression complexity attacks; most simply, by configuring a quadratic-time regular expression in a linkifier, and sending messages that exploited it. A regular expression attempted to parse the user-provided regexes to verify that they were safe from ReDoS -- this was both insufficient, as well as _itself_ subject to ReDoS if the organization administrator entered a sufficiently complex invalid regex. Affected users should [upgrade to the just-released Zulip 4.7](https://zulip.readthedocs.io/en/latest/production/upgrade-or-modify.html#upgrading-to-a-release), or [`main`](https://zulip.readthedocs.io/en/latest/production/upgrade-or-modify.html#upgrading-from-a-git-repository).
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/zulip/zulip/commit/e2d303c1bb5f538d17dc3d9134bc8858bdece781
https://github.com/zulip/zulip/security/advisories/GHSA-4h36-mqfq-42jg
https://securitylab.github.com/advisories/GHSL-2021-118-zulip-zulip/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 zulip zulip * Up to (excluding) 4.7
CVSS3评分 4.3
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 低
  • 保密性 无
  • 完整性 无
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CWE-ID 漏洞类型
CWE-1333 Inefficient Regular Expression Complexity
CWE-400 未加控制的资源消耗(资源穷尽)
CWE-697 不充分的比较
NVD-CWE-Other
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0