Regular expression denial-of-service in Zulip
Description
Zulip is an open source team chat server. In affected versions Zulip allows organization administrators on a server to configure "linkifiers" that automatically create links from messages that users send, detected via arbitrary regular expressions. Malicious organization administrators could subject the server to a denial-of-service via regular expression complexity attacks; most simply, by configuring a quadratic-time regular expression in a linkifier, and sending messages that exploited it. A regular expression attempted to parse the user-provided regexes to verify that they were safe from ReDoS -- this was both insufficient, as well as _itself_ subject to ReDoS if the organization administrator entered a sufficiently complex invalid regex. Affected users should upgrade to the just-released Zulip 4.7, or `main`.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/zulip/zulip/commit/e2d303c1bb5f538d17dc3d9134bc8858bdece781mitrex_refsource_MISC
- github.com/zulip/zulip/security/advisories/GHSA-4h36-mqfq-42jgmitrex_refsource_CONFIRM
- securitylab.github.com/advisories/GHSL-2021-118-zulip-zulip/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.