Vulnerability Details : CVE-2022-24713
regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
Vulnerability category: Denial of service
Products affected by CVE-2022-24713
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:a:rust-lang:regex:*:*:*:*:*:rust:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-24713
0.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-24713
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-24713
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Secondary)
-
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-24713
-
https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html
[SECURITY] [DLA 2978-1] thunderbird security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html
[SECURITY] [DLA 2971-1] firefox-esr security updateMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202208-08
Mozilla Firefox: Multiple Vulnerabilities (GLSA 202208-08) — Gentoo securityThird Party Advisory
-
https://www.debian.org/security/2022/dsa-5118
Debian -- Security Information -- DSA-5118-1 thunderbirdThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/
[SECURITY] Fedora 35 Update: rust-regex-1.5.5-1.fc35 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5113
Debian -- Security Information -- DSA-5113-1 firefox-esrThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/
[SECURITY] Fedora 34 Update: rust-regex-1.5.5-1.fc34 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202208-14
Mozilla Thunderbird: Multiple Vulnerabilities (GLSA 202208-14) — Gentoo securityThird Party Advisory
-
https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8
Regexes with large repetitions on empty sub-expressions take a very long time to parse · Advisory · rust-lang/regex · GitHubThird Party Advisory
-
https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw
Security advisory for the regex crate (CVE-2022-24713)Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/
[SECURITY] Fedora 36 Update: rust-regex-1.5.5-1.fc36 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e
security: fix denial-of-service bug in compiler · rust-lang/regex@ae70b41 · GitHubPatch;Third Party Advisory
Jump to