CVE-2021-32763

OpenProject is open-source, web-based project management software. In versions prior to 11.3.3, the `MessagesController` class of OpenProject has a `quote` method that implements the logic behind the Quote button in the discussion forums, and it uses a regex to strip `<pre>` tags from the message being quoted. The `(.|\s)` part can match a space character in two ways, so an unterminated `<pre>` tag containing `n` spaces causes Ruby's regex engine to backtrack to try 2<sup>n</sup> states in the NFA. This will result in a Regular Expression Denial of Service. The issue is fixed in OpenProject 11.3.3. As a workaround, one may install the patch manually.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
CVSS v2 : 4.0
v3 : 6.5
v2 : 4.0
v3 : 4.3
References () https://github.com/opf/openproject/pull/9447.patch - Patch, Third Party Advisory () https://github.com/opf/openproject/pull/9447.patch - Patch, Third Party Advisory
References () https://github.com/opf/openproject/security/advisories/GHSA-qqvp-j6gm-q56f - Patch, Third Party Advisory () https://github.com/opf/openproject/security/advisories/GHSA-qqvp-j6gm-q56f - Patch, Third Party Advisory

Information

Published : 2021-07-20 17:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32763

Mitre link : CVE-2021-32763

CVE.ORG link : CVE-2021-32763


JSON object : View

Products Affected

openproject

  • openproject
CWE
CWE-400

Uncontrolled Resource Consumption

NVD-CWE-Other