CVE-2023-22467Regex Denial of Service in Luxon

Severity
7.5HIGHNVD
EPSS
0.7%
top 27.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 4
Latest updateJan 9

Description

Luxon is a library for working with dates and times in JavaScript. On the 1.x branch prior to 1.38.1, the 2.x branch prior to 2.5.2, and the 3.x branch on 3.2.1, Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This issue also appears in Moment as CVE-2022-31129. Versions 1.38.1, 2.5.2, an

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

npmmoment/luxon1.0.01.28.1+2
NVDmomentjs/luxon1.0.01.28.1+2
CVEListV5moment/luxon>= 1.0.0, < 1.38.1, >= 2.0.0, < 2.5.2, >= 3.0.0, < 3.2.1+2

Patches

🔴Vulnerability Details

3
GHSA
Luxon Inefficient Regular Expression Complexity vulnerability2023-01-09
OSV
Luxon Inefficient Regular Expression Complexity vulnerability2023-01-09
CVEList
luxon.js inefficient regular expression complexity vulnerability2023-01-04

📋Vendor Advisories

1
Red Hat
luxon: Inefficient regular expression complexity in luxon.js2023-01-04
CVE-2023-22467 — Regex Denial of Service in Luxon | cvebase