admin管理员组文章数量:1344212
Wherever I use Regex in JavaScript code, SonarQube shows vulnerability issue. Is there any alternate for Regex in JavaScript?
Sample Regex:
(^(?=[A-Za-z0-9\._-]*$)(?=.*[A-Za-z0-9]).*$)
Error:
Make sure that using a regular expression is safe here.
Wherever I use Regex in JavaScript code, SonarQube shows vulnerability issue. Is there any alternate for Regex in JavaScript?
Sample Regex:
(^(?=[A-Za-z0-9\._-]*$)(?=.*[A-Za-z0-9]).*$)
Error:
Share Improve this question edited Feb 17, 2023 at 15:19 Penny Liu 17.6k5 gold badges86 silver badges108 bronze badges asked Feb 28, 2020 at 9:45 Krupesh KotechaKrupesh Kotecha 2,4123 gold badges22 silver badges40 bronze badges 2Make sure that using a regular expression is safe here.
- Can you add the SonarQube error to your question ? For regex, I have only seen security hotspot for regex so far. The main issues is that you need to avoid Regex allowing DoS operations. – JardonS Commented Feb 28, 2020 at 9:55
- updated my code – Krupesh Kotecha Commented Feb 28, 2020 at 10:41
2 Answers
Reset to default 6This is not really an issues, but a security warning.
Did you check the SonarQube description of the error ?
Evaluating regular expressions against input strings is potentially an extremely CPU-intensive task. Specially crafted regular expressions such as (a+)+s will take several seconds to evaluate the input string aaaaaaaaaaaaaaaaaaaaaaaaaaaaabs.
The problem is that with every additional a character added to the input, the time required to evaluate the regex doubles. However, the equivalent regular expression, a+s (without grouping) is efficiently evaluated in milliseconds and scales linearly with the input size.
Evaluating such regular expressions opens the door to Regular expression Denial of Service (ReDoS) attacks. In the context of a web application, attackers can force the web server to spend all of its resources evaluating regular expressions thereby making the service inaccessible to genuine users.
This rule flags any execution of a hardcoded regular expression which has at least 3 characters and at least two instances of any of the following characters: *+{.
Example: (a+)*
Ask Yourself Whether • the executed regular expression is sensitive and a user can provide a string which will be analyzed by this regular expression. • your regular expression engine performance decrease with specially crafted inputs and regular expressions.
You may be at risk if you answered yes to any of those questions.
To solve the issue, you need to humanly check if the RegEx is at risk. If not, you can just flag it as a false positive, otherwise, reviewing the regex can be mandatory.
Additional information on regex DoS issues can be found on OWASP web site
String regex = request.getParameter("regex"); String input = request.getParameter("input");
input.matches(Pattern.quote(regex));
// Compliant : with Pattern.quote metacharacters or escape sequences will be given no special meaning
Note:- working in sonar
本文标签: SonarQube Regex vulnerability issue in JavaScriptStack Overflow
版权声明:本文标题:SonarQube Regex vulnerability issue in JavaScript - Stack Overflow 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.betaflare.com/web/1743741240a2530932.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论