4.9 • 696 Ratings
🗓️ 20 August 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, August 21st, 2018 edition of the Sandcent Storm Center's Stormcast. My name is Johannes Ulrich, and I'm recording from Stockholm, Germany. |
0:12.1 | An old saying in the Unix world is that if you have a problem and you're trying to solve it with a regular expression, well, you end up with two problems. |
0:22.6 | Regular expressions are very handy if you're trying to validate complex patterns, but that comes at a cost. |
0:30.8 | Regular expressions are also very complex to analyze. This often leads to regular expression denial of service or redos vulnerabilities. |
0:41.2 | In a recent paper published last week at Eusenix, some German researchers took a look at this |
0:48.0 | problem for Node.js modules. As part of the work, they found 25 popular notable Node.js modules. |
0:58.0 | Again, this is just the denial of service attack, but a simple request may keep your server |
1:04.0 | busy for at least several seconds in some cases longer. |
1:09.0 | As part of the paper, they published a couple of the |
1:12.6 | regular expressions that they found to be vulnerable. Not all of them are terribly complex. |
1:18.6 | One for example just looks for spaces followed by a comma followed by spaces. So sometimes |
1:25.6 | it may be possible to use something else than a regular expression. |
1:30.0 | And that's really your first solution here. Whenever you use a regular expression, think if you can |
1:34.5 | accomplish the same thing without it, for example, by checking if certain characters are just |
1:40.8 | present, or to see if a string, for example, is numeric or not. |
1:45.7 | And usually you have some C-LIP functions that can accomplish that much more efficiently. |
1:52.1 | Another way to mitigate this problem somewhat is just to limit the overall size of the string. |
1:58.5 | So limiting it to something reasonable can also help with this |
2:03.4 | vulnerability or at least limit the impact of it. |
2:06.9 | And then we got a couple more details about the SSH username enumeration. |
2:14.6 | Did he wrote up some of the things that we know about it so far he has |
2:19.3 | played with it quite a bit now one thing you may have noticed is that there are no real good |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.