Description
In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2 and is fixed in 2.4.3.
No analysis available yet.
Remediation
Vendor Workaround
Upgrade to Apache ShenYu (incubating) 2.4.3 or apply patch https://github.com/apache/incubator-shenyu/pull/2975.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3643 | In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2 and is fixed in 2.4.3. |
Github GHSA |
GHSA-cw56-j3fm-7w57 | Regular expression denial of service in Apache ShenYu |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T05:11:43.499Z
Reserved: 2022-03-07T00:00:00.000Z
Link: CVE-2022-26650
No data.
Status : Modified
Published: 2022-05-17T08:15:06.423
Modified: 2024-11-21T06:54:15.510
Link: CVE-2022-26650
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA