CVE-2022-26650Regex Denial of Service in Software Foundation Apache Shenyu

Severity
7.5HIGHNVD
EPSS
1.1%
top 22.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17
Latest updateMay 18

Description

In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2 and is fixed in 2.4.3.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5apache_software_foundation/apache_shenyuunspecified2.4.3
NVDapache/shenyu2.4.0, 2.4.1, 2.4.2+2

Patches

🔴Vulnerability Details

3
OSV
Regular expression denial of service in Apache ShenYu2022-05-18
GHSA
Regular expression denial of service in Apache ShenYu2022-05-18
CVEList
Apache ShenYu (incubating) Regular expression denial of service2022-05-17
CVE-2022-26650 — Regex Denial of Service | cvebase