Home / Vulnerability Database / PHP : DOS attack via regular expressions possible
PHP
PHP : DOS attack via regular expressions possible
Classification
OWASP ASVS
CWE
Overview
The regexp used is from an unreliable source, which can be computationally intensive for some inputs. Regular expression denial of service (ReDOS) attack is possible.
Regular expressions are widely used in applications to validate the user-supplied data. Expressions containing structures like (( )+)+ cause execution of a significant amount of iterations. By inputting a certain type of string an attacker can disrupt the application operation. All implementations of regular expressions have such vulnerabilities.
MEDIUM
DerScanner Severity Score
Do you want to fix PHP : DOS attack via regular expressions possible in your application?
See also
PHP
PHP : Null salt
PHP
PHP : Empty password
PHP
