CVE-2023-22467

Luxon is a library for working with dates and times in JavaScript. On the 1.x branch prior to 1.38.1, the 2.x branch prior to 2.5.2, and the 3.x branch on 3.2.1, Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This issue also appears in Moment as CVE-2022-31129. Versions 1.38.1, 2.5.2, and 3.2.1 contain patches for this issue. As a workaround, limit the length of the input.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:momentjs:luxon:*:*:*:*:*:node.js:*:*
cpe:2.3:a:momentjs:luxon:*:*:*:*:*:node.js:*:*
cpe:2.3:a:momentjs:luxon:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 07:44

Type Values Removed Values Added
Summary
  • (es) Luxon es una librería para trabajar con fechas y horas en JavaScript. En la rama 1.x anterior a 1.38.1, la rama 2.x anterior a 2.5.2 y la rama 3.x en 3.2.1, `DateTime.fromRFC2822() de Luxon tiene complejidad cuadrática (N^2) en algunas entradas específicas. Esto provoca una notable desaceleración en las entradas con longitudes superiores a 10 000 caracteres. Por lo tanto, los usuarios que proporcionan datos no confiables a este método son vulnerables a ataques (Re)DoS. Este problema también aparece en Moment como CVE-2022-31129. Las versiones 1.38.1, 2.5.2 y 3.2.1 contienen parches para este problema. Como workaround, limite la longitud de la entrada.
References () https://github.com/moment/luxon/commit/5ab3bf64a10da929a437629cdb2f059bb83212bf - Patch, Third Party Advisory () https://github.com/moment/luxon/commit/5ab3bf64a10da929a437629cdb2f059bb83212bf - Patch, Third Party Advisory
References () https://github.com/moment/luxon/security/advisories/GHSA-3xq5-wjfh-ppjc - Third Party Advisory () https://github.com/moment/luxon/security/advisories/GHSA-3xq5-wjfh-ppjc - Third Party Advisory
References () https://github.com/moment/moment/pull/6015#issuecomment-1152961973 - Patch, Third Party Advisory () https://github.com/moment/moment/pull/6015#issuecomment-1152961973 - Patch, Third Party Advisory
References () https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g - Not Applicable, Third Party Advisory () https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g - Not Applicable, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44I3WAJKYXDLOVYRGMHAUXMIV4SPFXDZ/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44I3WAJKYXDLOVYRGMHAUXMIV4SPFXDZ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4LIVOASKBQH7FEUI5RWM3SOHR6VK7ZZR/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4LIVOASKBQH7FEUI5RWM3SOHR6VK7ZZR/ -

12 Feb 2024, 04:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44I3WAJKYXDLOVYRGMHAUXMIV4SPFXDZ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4LIVOASKBQH7FEUI5RWM3SOHR6VK7ZZR/ -

Information

Published : 2023-01-04 22:15

Updated : 2024-11-21 07:44


NVD link : CVE-2023-22467

Mitre link : CVE-2023-22467

CVE.ORG link : CVE-2023-22467


JSON object : View

Products Affected

momentjs

  • luxon
CWE
CWE-1333

Inefficient Regular Expression Complexity