cve/2021/CVE-2021-23346.md

23 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-23346](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23346)
![](https://img.shields.io/static/v1?label=Product&message=html-parse-stringify&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=html-parse-stringify2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%202.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen)
### Description
This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.
### POC
#### Reference
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633
- https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306
- https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307
#### Github
- https://github.com/engn33r/awesome-redos-security
- https://github.com/yetingli/PoCs