Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Regex DDoS #104

Open
clarkio opened this issue Apr 17, 2019 · 2 comments
Open

Regex DDoS #104

clarkio opened this issue Apr 17, 2019 · 2 comments

Comments

@clarkio
Copy link
Owner

clarkio commented Apr 17, 2019

Is this something the extension is vulnerable to since we're using a regular expression to parse the command messages or are we ok as is? What do we need to do or take into consideration to mitigate the risk of regular expression attacks on the extension?

@clarkio
Copy link
Owner Author

clarkio commented Apr 17, 2019

Thanks to the suggestion from @NotMyself on stream today, we should consider using the library minimist to parse commands in chat instead of using a regular expression to avoid this.

Minimist: https://github.com/substack/minimist

@clarkio
Copy link
Owner Author

clarkio commented Apr 17, 2019

After checking out minimist I don't think it will work well for parsing chat messages in our scenario.

Also after reading up a little bit more from this OWASP article on ReDoS it seems we don't have any regex patterns that would be vulnerable to such an attack: https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS

We should create a test at least to validate the regex pattern doesn't introduce changes to it that are susceptible to ReDoS.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant