CVE-2023-22467

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-22467
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-22467.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-22467
Aliases
Related
Published
2023-01-04T21:52:14Z
Modified
2025-10-22T18:34:47.923448Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
luxon.js inefficient regular expression complexity vulnerability
Details

Luxon is a library for working with dates and times in JavaScript. On the 1.x branch prior to 1.38.1, the 2.x branch prior to 2.5.2, and the 3.x branch on 3.2.1, Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This issue also appears in Moment as CVE-2022-31129. Versions 1.38.1, 2.5.2, and 3.2.1 contain patches for this issue. As a workaround, limit the length of the input.

Database specific
{
    "cwe_ids": [
        "CWE-1333"
    ]
}
References

Affected packages

Git / github.com/moment/luxon

Affected ranges

Type
GIT
Repo
https://github.com/moment/luxon
Events
Type
GIT
Repo
https://github.com/moment/luxon
Events

Affected versions

2.*

2.0.0
2.0.1
2.1.0
2.1.1
2.2.0
2.3.0
2.3.1
2.3.2
2.4.0
2.5.0