OUPMATH / OxfrodMaths_Prod

0 stars 0 forks source link

11. Using Moment.js version 2.8.4 #66

Open mayank2k2 opened 7 years ago

mayank2k2 commented 7 years ago

Security Testing focal points 1)While accessing the application using wappalyzer, it was found that application is using moment.js version 2.8.4( CVE-2016-4055) which is vulnerable to Regular expression denial of service vulnerability. It clearly indicate that this application is vulnerable to Using Components with Known Vulnerabilities .PFB the screenshot for reference and details of CVE-2016-4055 below. CVE-2016-4055:The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time." Moment.js is vulnerable to regular expression denial of service when user input is passed unchecked into moment.duration() blocking the event loop for a period of time.

image

Mitigation: 1.Update to version 2.11.2 or greater

VrandaNagar commented 7 years ago

Hi Mayank, I did analysis on the above issue and would like to suggest minimization of all the js (those are yet to be minified) and .net bundling.

Thanks! Vranda

mayank2k2 commented 7 years ago

Correct