Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Apache ShenYu (incubating) Regular expression denial of service
Vulnerability Description
In Apache ShenYui, ShenYu-Bootstrap, RegexPredicateJudge.java uses Pattern.matches(conditionData.getParamValue(), realData) to make judgments, where both parameters are controllable by the user. This can cause an attacker pass in malicious regular expressions and characters causing a resource exhaustion. This issue affects Apache ShenYu (incubating) 2.4.0, 2.4.1 and 2.4.2 and is fixed in 2.4.3.
CVSS Information
N/A
Vulnerability Type
CWE-1333
Vulnerability Title
Apache ShenYu 安全漏洞
Vulnerability Description
Apache ShenYu是美国阿帕奇(Apache)基金会的一个异步的,高性能的,跨语言的,响应式的 API 网关。 Apache ShenYu存在安全漏洞,该漏洞源于在ShenYu-Bootstrap的RegexPredicateJudge.java 中使用 Pattern.matches(conditionData.getParamValue(), realData) 进行判断,其中两个参数都由用户控制。攻击者利用该漏洞传入恶意正则表达式和字符,从而导致资源耗尽。
CVSS Information
N/A
Vulnerability Type
N/A