You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Regular Expression Denial of Service (ReDoS) is a type of attack that exploits the fact that certain regular expressions can take an extremely long time to process, causing applications or services to become unresponsive or crash.
4
+
5
+
6
+
## Denial of Service - ReDoS
7
+
8
+
*[tjenkinson/redos-detector](https://github.com/tjenkinson/redos-detector) - A CLI and library which tests with certainty if a regex pattern is safe from ReDoS attacks. Supported in the browser, Node and Deno.
9
+
*[doyensec/regexploit](https://github.com/doyensec/regexploit) - Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
10
+
*[devina.io/redos-checker](https://devina.io/redos-checker) - Examine regular expressions for potential Denial of Service vulnerabilities
11
+
12
+
13
+
### Evil Regex
14
+
15
+
Evil Regex contains:
16
+
17
+
* Grouping with repetition
18
+
* Inside the repeated group:
19
+
* Repetition
20
+
* Alternation with overlapping
21
+
22
+
**Examples**
23
+
24
+
*`(a+)+`
25
+
*`([a-zA-Z]+)*`
26
+
*`(a|aa)+`
27
+
*`(a|a?)+`
28
+
*`(.*a){x}` for x \> 10
29
+
30
+
These regular expressions can be exploited with `aaaaaaaaaaaaaaaaaaaaaaaa!`
31
+
32
+
33
+
## References
34
+
35
+
*[Regular expression Denial of Service - ReDoS - OWASP - Adar Weidman](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)
0 commit comments