In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2 and is fixed in 2.4.3.
Fixes

Solution

No solution given by the vendor.


Workaround

Upgrade to Apache ShenYu (incubating) 2.4.3 or apply patch https://github.com/apache/incubator-shenyu/pull/2975.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T05:11:43.499Z

Reserved: 2022-03-07T00:00:00

Link: CVE-2022-26650

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-17T08:15:06.423

Modified: 2024-11-21T06:54:15.510

Link: CVE-2022-26650

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.