logo

Database

Asymmetric denial of service - ReDoS In rhino

Ecosystem
Package
Affected version
Patched versions

Description

Rhino has high CPU usage and potential DoS when passing specific numbers to toFixed() function When an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service.

Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power.

Example code: (4.47118444E-314).toFixed(2)

Mitigation

debian rhino: No known patch available

maven org.mozilla:rhino: Upgrade to version(s) 1.7.14.1, 1.7.15.1, 1.8.1 or higher.

Severity v4.0

2.7

Low

Fluid Attacks ID

FLAT-OEBAB

CWE ID(s)

CWE-400

Alternative ID

GHSA-3w8q-xq97-5j7x

EPSS

N/A

Percentile

N/A

Source

GitHub Advisory Database

Does your application use this vulnerable software?

During the free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.