-
Notifications
You must be signed in to change notification settings - Fork 580
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
CVE-2022-37620/ ReDoS found in htmlminifier.js #1135
Comments
Is anyone willing to work on this? |
Any update on this? |
One of the lines referred to be the CVE has the following regex Would changing it to
|
I stumbled upon a fork of this maintained by terser: https://www.npmjs.com/package/html-minifier-terser Probably the way to go. |
any updates? |
@littleblack111 as mentioned above, along with the slew of references to others switching, html-minifier-terser is probably the best solution. Aside from some repo adjustments this solution appears to be fairly abandoned, especially since the package hasn't been updated in 5 years, while |
Now I've just got to remember what project I'm involved in that has this one as an issue! |
any update on this issue? |
@Hessah95 The comments in this thread point to another solution that's maintained. |
html-minifier-terser latest version (7.2.0) still has the vulnerability? I just installed it and it says so. |
@ra-dave I first installed version 7.2.0 as well, but it broke my unit tests. I then went for version 5.1.1 which keeps my unit tests passing and it made the vulnerability go away. Of course, this only works if you don’t need the newest version. |
Can anyone provide a working proof of concept that confirms the issue can be actively exploited? Also what would be the definitive solution here? |
It seems the CVE record differs from https://security.snyk.io/vuln/SNYK-JS-HTMLMINIFIER-3091181, which contains more details. Not sure why this is the case. I will clarify with Snyk. Edit: the It seems the CVE description is more than misleading, at best incomplete and inaccurate. |
It seems the PoC is more complex than needed. The code basically makes not much sense: It should be probably this:
Because the The So the following PoC code is sufficient: The issue is in the following code part: var customFragments = options.ignoreCustomFragments.map(function(re) {
return re.source;
});
if (customFragments.length) {
var reCustomIgnore = new RegExp('\\s*(?:' + customFragments.join('|') + ')+\\s*', 'g');
// temporarily replace custom ignored fragments with unique attributes
value = value.replace(reCustomIgnore, function(match) {
if (!uidAttr) {
uidAttr = uniqueId(value);
uidPattern = new RegExp('(\\s*)' + uidAttr + '([0-9]+)' + uidAttr + '(\\s*)', 'g');
if (options.minifyCSS) {
options.minifyCSS = (function(fn) {
return function(text, type) {
text = text.replace(uidPattern, function(match, prefix, index) {
var chunks = ignoredCustomMarkupChunks[+index];
return chunks[1] + uidAttr + index + uidAttr + chunks[2];
});
var ids = [];
new CleanCSS().minify(wrapCSS(text, type)).warnings.forEach(function(warning) {
var match = uidPattern.exec(warning);
if (match) {
var id = uidAttr + match[2] + uidAttr;
text = text.replace(id, ignoreCSS(id));
ids.push(id);
}
});
text = fn(text, type);
ids.forEach(function(id) {
text = text.replace(ignoreCSS(id), id);
});
return text;
};
})(options.minifyCSS);
}
if (options.minifyJS) {
options.minifyJS = (function(fn) {
return function(text, type) {
return fn(text.replace(uidPattern, function(match, prefix, index) {
var chunks = ignoredCustomMarkupChunks[+index];
return chunks[1] + uidAttr + index + uidAttr + chunks[2];
}), type);
};
})(options.minifyJS);
}
}
var token = uidAttr + ignoredCustomMarkupChunks.length + uidAttr;
ignoredCustomMarkupChunks.push(/^(\s*)[\s\S]*?(\s*)$/.exec(match));
return '\t' + token + '\t';
});
} After checking further, the following line is the problem:
The person whou found the problem, probably used https://devina.io/redos-checker, which also uses the same type of attack string: The problem Migitations
|
For anyone asking, html-minifier-terser is also affected. So switching to it will not resolve this. You will just get less reported CVEs but you will also have a false-negative then. |
And of course it affects all the other downstream packages, including these:
|
Hi any updates on the plan to fix this? |
Ohh Gosh! |
not yet i think |
This project requires new owner. |
A Regular Expression Denial of Service (ReDoS) flaw was found in kangax html-minifier 4.0.0 via the candidate variable in htmlminifier.js.
The ReDoS vulnerability can be mitigated with several best practices described here: [https://snyk.io/blog/redos-and-catastrophic-backtracking/]
The text was updated successfully, but these errors were encountered: