Skip to content

Commit 53d9014

Browse files
committed
Regular Expression ReDoS
1 parent 43a8c6a commit 53d9014

File tree

2 files changed

+37
-0
lines changed

2 files changed

+37
-0
lines changed

API Key Leaks/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ Use : https://github.com/ozguralp/gmapsapiscanner/
7575
7676
7777
Impact:
78+
7879
* Consuming the company's monthly quota or can over-bill with unauthorized usage of this service and do financial damage to the company
7980
* Conduct a denial of service attack specific to the service if any limitation of maximum bill control settings exist in the Google account
8081

Regular Expression/README.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
# Regular Expression
2+
3+
> Regular Expression Denial of Service (ReDoS) is a type of attack that exploits the fact that certain regular expressions can take an extremely long time to process, causing applications or services to become unresponsive or crash.
4+
5+
6+
## Denial of Service - ReDoS
7+
8+
* [tjenkinson/redos-detector](https://github.com/tjenkinson/redos-detector) - A CLI and library which tests with certainty if a regex pattern is safe from ReDoS attacks. Supported in the browser, Node and Deno.
9+
* [doyensec/regexploit](https://github.com/doyensec/regexploit) - Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
10+
* [devina.io/redos-checker](https://devina.io/redos-checker) - Examine regular expressions for potential Denial of Service vulnerabilities
11+
12+
13+
### Evil Regex
14+
15+
Evil Regex contains:
16+
17+
* Grouping with repetition
18+
* Inside the repeated group:
19+
* Repetition
20+
* Alternation with overlapping
21+
22+
**Examples**
23+
24+
* `(a+)+`
25+
* `([a-zA-Z]+)*`
26+
* `(a|aa)+`
27+
* `(a|a?)+`
28+
* `(.*a){x}` for x \> 10
29+
30+
These regular expressions can be exploited with `aaaaaaaaaaaaaaaaaaaaaaaa!`
31+
32+
33+
## References
34+
35+
* [Regular expression Denial of Service - ReDoS - OWASP - Adar Weidman](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)
36+
* [OWASP Validation Regex Repository - OWASP](https://wiki.owasp.org/index.php/OWASP_Validation_Regex_Repository)

0 commit comments

Comments
 (0)