In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade surrealdb-core
to version 2.0.5, 2.1.5, 2.2.2 or higher.
Affected versions of this package are vulnerable to Memory Allocation with Excessive Size Value through the string::replace
function. An attacker can exhaust server memory and cause a denial of service by crafting a query that uses a Regex to perform a string replacement, leading to unrestricted string length allocations.
Note:
This is only exploitable if the attacker has authenticated access to the database.
This vulnerability can be mitigated by limiting the ability of untrusted clients to run the string::replace
function using the --deny-functions
flag or the SURREAL_CAPS_DENY_FUNC
environment variable.