You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Unsanitized input from the request URL flows into java.util.regex.Pattern.compile, where it is used in a regular expression. This may result in a Regular Expression Injection vulnerability which could lead to a Denial of Service attack.
Concerned files on 1.8.0 :
openbas-api/src/main/java/io/openbas/rest/challenge/ChallengeApi.java:126
The text was updated successfully, but these errors were encountered:
Dimfacion
added
bug
use for describing something not working as expected
needs triage
use to identify issue needing triage from Filigran Product team
security
use to identify issue related to security
and removed
needs triage
use to identify issue needing triage from Filigran Product team
labels
Oct 30, 2024
Description
Unsanitized input from the request URL flows into java.util.regex.Pattern.compile, where it is used in a regular expression. This may result in a Regular Expression Injection vulnerability which could lead to a Denial of Service attack.
Concerned files on 1.8.0 :
openbas-api/src/main/java/io/openbas/rest/challenge/ChallengeApi.java:126
openbas-api/src/main/java/io/openbas/rest/challenge/ChallengeApi.java:139
The text was updated successfully, but these errors were encountered: