This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Regular expression Denial of Service - ReDoS"

From OWASP
Jump to: navigation, search
(Adding an ReDoS as an attack)
 
(Add minimatch example)
 
(4 intermediate revisions by 4 users not shown)
Line 10: Line 10:
 
==Description==
 
==Description==
 
===The problematic Regex naïve algorithm===
 
===The problematic Regex naïve algorithm===
The Regular Expression naïve algorithm builds a [http://en.wikipedia.org/wiki/Nondeterministic_finite_state_machine Nondeterministic Finite Automaton (NFA)], which is a finite state machine where for each pair of state and input symbol there may be several possible next states. Then the engine starts to make transition until the end of the input. Since there may be several possible next states, a deterministic algorithms is used. This algorithm tries one by one all the possible paths (if needed) until a match is found (or all the paths are tried and fail).
+
The Regular Expression naïve algorithm builds a [http://en.wikipedia.org/wiki/Nondeterministic_finite_state_machine Nondeterministic Finite Automaton (NFA)], which is a finite state machine where for each pair of state and input symbol there may be several possible next states. Then the engine starts to make transition until the end of the input. Since there may be several possible next states, a deterministic algorithm is used. This algorithm tries one by one all the possible paths (if needed) until a match is found (or all the paths are tried and fail).
  
 
For example, the Regex '''''^(a+)+$''''' is represented by the following NFA:
 
For example, the Regex '''''^(a+)+$''''' is represented by the following NFA:
Line 104: Line 104:
 
==References ==
 
==References ==
 
* [http://www.cs.rice.edu/~scrosby/hash/slides/USENIX-RegexpWIP.2.ppt Regular Expression Denial Of Service / Crosby&Wallach, Usenix Security 2003]
 
* [http://www.cs.rice.edu/~scrosby/hash/slides/USENIX-RegexpWIP.2.ppt Regular Expression Denial Of Service / Crosby&Wallach, Usenix Security 2003]
* [http://www.checkmarx.com/NewsDetails.aspx?id=23&cat=3 Regular expression Denial of Service Revisited]
+
* [http://www.checkmarx.com/NewsDetails.aspx?id=23&cat=3 Regular expression Denial of Service Revisited, Sep-2009]
 
* [[Media:20091210_VAC-REGEX_DOS-Adar_Weidman.pdf| VAC Presentation - ReDoS, OWASP-NL Chapter meeting Dec-2009]]
 
* [[Media:20091210_VAC-REGEX_DOS-Adar_Weidman.pdf| VAC Presentation - ReDoS, OWASP-NL Chapter meeting Dec-2009]]
 
* [[Podcast 56|OWASP podcast about ReDoS]]
 
* [[Podcast 56|OWASP podcast about ReDoS]]
 
* [[OWASP Validation Regex Repository]]
 
* [[OWASP Validation Regex Repository]]
 
* [http://regexlib.com/ RegExLib]
 
* [http://regexlib.com/ RegExLib]
 +
* [https://dzone.com/articles/regular-expressions-denial ReDOS Attacks: From the Exploitation to the Prevention (in .NET)]
 +
* [http://www.cs.bham.ac.uk/~hxt/research/rxxr.shtml Tool for detecting ReDoS vulnerabilities.]
 
* Examples of ReDoS in open source applications:
 
* Examples of ReDoS in open source applications:
 
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3277 ReDoS in DataVault]
 
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3277 ReDoS in DataVault]
 
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3275 ReDoS in EntLib]
 
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3275 ReDoS in EntLib]
 
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3276 ReDoS in NASD CORE.NET Terelik]
 
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3276 ReDoS in NASD CORE.NET Terelik]
 +
** [http://blog.malerisch.net/2015/09/net-mvc-redos-denial-of-service-vulnerability-cve-2015-2526.html ReDoS in .NET Framework]
 +
** [https://nodesecurity.io/advisories/118 ReDoS in Javascript minimatch]
  
 
==Credit==
 
==Credit==

Latest revision as of 15:50, 5 July 2017

This is an Attack. To view all attacks, please see the Attack Category page.


Last revision (mm/dd/yy): 07/5/2017


Introduction

The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time.

Description

The problematic Regex naïve algorithm

The Regular Expression naïve algorithm builds a Nondeterministic Finite Automaton (NFA), which is a finite state machine where for each pair of state and input symbol there may be several possible next states. Then the engine starts to make transition until the end of the input. Since there may be several possible next states, a deterministic algorithm is used. This algorithm tries one by one all the possible paths (if needed) until a match is found (or all the paths are tried and fail).

For example, the Regex ^(a+)+$ is represented by the following NFA:

NFA.png

For the input aaaaX there are 16 possible paths in the above graph. But for aaaaaaaaaaaaaaaaX there are 65536 possible paths, and the number is double for each additional a. This is an extreme case where the naïve algorithm is problematic, because it must pass on many many paths, and then fail.

Notice, that not all algorithms are naïve, and actually Regex algorithms can be written in an efficient way. Unfortunately, most Regex engines today try to solve not only "pure" Regexes, but also "expanded" Regexes with "special additions", such as back-references that cannot be always be solved efficiently (see Patterns for non-regular languages in Wiki-Regex for some more details). So even if the Regex is not "expanded", a naïve algorithm is used.

Evil Regexes

A Regex is called "evil" if it can stuck on crafted input.

Evil Regex pattern contains:

  • Grouping with repetition
  • Inside the repeated group:
    • Repetition
    • Alternation with overlapping

Examples of Evil Patterns:

  • (a+)+
  • ([a-zA-Z]+)*
  • (a|aa)+
  • (a|a?)+
  • (.*a){x} | for x > 10

All the above are susceptible to the input aaaaaaaaaaaaaaaaaaaaaaaa! (The minimum input length might change slightly, when using faster or slower machines).

Attacks

The attacker might use the above knowledge to look for applications that use Regular Expressions, containing an Evil Regex, and send a well-crafted input, that will hang the system. Alternatively, if a Regex itself is affected by a user input, the attacker can inject an Evil Regex, and make the system vulnerable.

Risk Factors

The Web is Regex-Based:

RegexBasedWeb.png

In every layer of the WEB there are Regular Expressions, that might contain an Evil Regex. An attacker can hang a WEB-browser (on a computer or potentially also on a mobile device), hang a Web Application Firewall (WAF), attack a database, and even stack a vulnerable WEB server.

For example, if a programmer uses a Regex to validate the client side of a system, and the Regex contains an Evil Regex, the attacker can assume the same vulnerable Regex is used in the server side, and send a well-crafted input, that stacks the WEB server.

Examples

Vulnerable Regex in online repositories

1. ReGexLib,id=1757 (email validation) - see bold part, which is an Evil Regex

^([a-zA-Z0-9])(([\-.]|[_]+)?([a-zA-Z0-9]+))*(@){1}[a-z0-9]+[.]{1}(([a-z]{2,3})|([a-z]{2,3}[.]{1}[a-z]{2,3}))$

Input:

aaaaaaaaaaaaaaaaaaaaaaaa!

2. OWASP Validation Regex Repository, Java Classname - see bold part, which is an Evil Regex

^(([a-z])+.)+[A-Z]([a-z])+$

Input:

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!

Web application attack

  • Open a JavaScript
  • Find Evil Regex
  • Craft a malicious input for the found Regex
  • Submit a valid value via intercepting proxy
  • Change the request to contain a malicious input
  • You are done!

ReDoS via Regex Injection

The following example checks if the username is part of the password entered by the user.

String userName = textBox1.Text;
String password = textBox2.Text;
Regex testPassword = new Regex(userName);
Match match = testPassword.Match(password);
if (match.Success)
{
    MessageBox.Show("Do not include name in password.");
}
else
{
    MessageBox.Show("Good password.");
}

If an attacker enters ^(([a-z])+.)+[A-Z]([a-z])+$ as a username and aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa! as a password, the program will hang.

Related Threat Agents

TBD

Related Attacks

Related Vulnerabilities

Related Controls

References

Credit

This article includes content donated to OWASP by Checkmarx.JPG.