Closed yinxiL closed 3 years ago
Congrats automated tool finder, you found that in a mostly dormant project jquery has a problem. Which is a client-local issue, thus in the end does not matter as the user would be DoSed, if you can do this, you have already other javascript issues.
Regular Expression DoS vulnerability
We are working on the ReDoS problem and detected 2 vulnerable regex(es) from your repository.
1:
:((?:[\w\u00c0-\uFFFF\-]|\\.)+)(?:\((['"]?)((?:\([^\)]+\)|[^\(\)]*)+)\2\))?
in EpicEditor/docs/js/jquery.min.js 2:((?:\((?:\([^()]+\)|[^()]+)+\)|\[(?:\[[^\[\]]*\]|['"][^'"]*['"]|[^\[\]'"]+)+\]|\\.|[^ >+~,(\[\\]+)+|[>+~])(\s*,\s*)?((?:.|\r|\n)*)
in EpicEditor/docs/js/jquery.min.jsPlease try the following:
We didn’t create a pull request because we're not sure if these cases are possible to take place in your program, we also do not understand the functionality of these regexes as you do. Thank you for your understanding.