GHSA-8v9w-p43c-r885

Suggest an improvement
Source
https://github.com/advisories/GHSA-8v9w-p43c-r885
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-8v9w-p43c-r885/GHSA-8v9w-p43c-r885.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8v9w-p43c-r885
Aliases
Published
2022-06-21T20:12:15Z
Modified
2023-11-08T04:09:26.020407Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Reachable Assertion in rulex
Details

Impact

When parsing untrusted rulex expressions, rulex may crash, possibly enabling a Denial of Service attack. This happens when the expression contains a multi-byte UTF-8 code point in a string literal or after a backslash, because rulex tries to slice into the code point and panics as a result.

This is a security concern for you, if - your service parses untrusted rulex expressions (expressions provided by an untrusted user), and - your service becomes unavailable when the thread running rulex panics.

Patches

The crashes are fixed in version 0.4.3. Affected users are advised to update to this version.

Workarounds

You can use catch_unwind to recover from panics.

For more information

If you have any questions or comments about this advisory: * Open an issue in rulex * Email me at ludwig.stecher@gmx.de

Credits

Credit for finding these bugs goes to

Database specific
{
    "nvd_published_at": "2022-06-27T22:15:00Z",
    "github_reviewed_at": "2022-06-21T20:12:15Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-617"
    ]
}
References

Affected packages

crates.io / rulex

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.3