-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
validate: try quadratic, cubic, etc. #40
Comments
davisjam
added a commit
that referenced
this issue
Apr 11, 2018
Problem: The detectors are eager to exploit higher-order polynomially vulnerable regexes. In doing so they may overstep and cause a match, so no backtracking is required. Example: See discussion in Weideman: NicolaasWeideman/RegexStaticAnalysis#11 Solution: In such a case the lesser polynomials may still be effective. validate-vuln.pl now iterates over the proposed list of pumpPairs and tries pumpPairs 1..$i. If any time out we have a winner. Fixes: #40 Test: - Various tests for check-regex Misc: - Also fixes issue in check-regex: wrong path to cache-client
davisjam
added a commit
that referenced
this issue
Apr 11, 2018
Problem: The detectors are eager to exploit higher-order polynomially vulnerable regexes. In doing so they may overstep and cause a match, so no backtracking is required. Example: See discussion in Weideman: NicolaasWeideman/RegexStaticAnalysis#11 Solution: In such a case the lesser polynomials may still be effective. validate-vuln.pl now iterates over the proposed list of pumpPairs and tries pumpPairs 1..$i. If any time out we have a winner. Fixes: #40 Test: - Various tests for check-regex Misc: - Also fixes issue in check-regex: wrong path to cache-client
jamesdonoh
pushed a commit
to jamesdonoh/vuln-regex-detector
that referenced
this issue
Feb 13, 2019
Problem: The detectors are eager to exploit higher-order polynomially vulnerable regexes. In doing so they may overstep and cause a match, so no backtracking is required. Example: See discussion in Weideman: NicolaasWeideman/RegexStaticAnalysis#11 Solution: In such a case the lesser polynomials may still be effective. validate-vuln.pl now iterates over the proposed list of pumpPairs and tries pumpPairs 1..$i. If any time out we have a winner. Fixes: davisjam#40 Test: - Various tests for check-regex Misc: - Also fixes issue in check-regex: wrong path to cache-client
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
See this issue. I think a loop in
validate-vuln.pl
would work.The text was updated successfully, but these errors were encountered: