OpenProject is open-source, web-based project management software. In versions prior to 11.3.3, the `MessagesController` class of OpenProject has a `quote` method that implements the logic behind the Quote button in the discussion forums, and it uses a regex to strip `<pre>` tags from the message being quoted. The `(.|\s)` part can match a space character in two ways, so an unterminated `<pre>` tag containing `n` spaces causes Ruby's regex engine to backtrack to try 2<sup>n</sup> states in the NFA. This will result in a Regular Expression Denial of Service. The issue is fixed in OpenProject 11.3.3. As a workaround, one may install the patch manually.
References
Link | Resource |
---|---|
https://github.com/opf/openproject/pull/9447.patch | Patch Third Party Advisory |
https://github.com/opf/openproject/security/advisories/GHSA-qqvp-j6gm-q56f | Patch Third Party Advisory |
https://github.com/opf/openproject/pull/9447.patch | Patch Third Party Advisory |
https://github.com/opf/openproject/security/advisories/GHSA-qqvp-j6gm-q56f | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 4.3 |
References | () https://github.com/opf/openproject/pull/9447.patch - Patch, Third Party Advisory | |
References | () https://github.com/opf/openproject/security/advisories/GHSA-qqvp-j6gm-q56f - Patch, Third Party Advisory |
Information
Published : 2021-07-20 17:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32763
Mitre link : CVE-2021-32763
CVE.ORG link : CVE-2021-32763
JSON object : View
Products Affected
openproject
- openproject
CWE