fix(deps): update dependency @octokit/request to v9.2.1 [security]#636
Merged
fix(deps): update dependency @octokit/request to v9.2.1 [security]#636
Conversation
wolfy1339
approved these changes
Feb 14, 2025
Contributor
Author
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
|
🎉 This PR is included in version 8.2.1 🎉 The release is available on: Your semantic-release bot 📦🚀 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
9.2.0->9.2.1GitHub Vulnerability Alerts
CVE-2025-25290
Summary
The regular expression
/<([^>]+)>; rel="deprecation"/used to match thelinkheader in HTTP responses is vulnerable to a ReDoS (Regular Expression Denial of Service) attack. This vulnerability arises due to the unbounded nature of the regex's matching behavior, which can lead to catastrophic backtracking when processing specially crafted input. An attacker could exploit this flaw by sending a maliciouslinkheader, resulting in excessive CPU usage and potentially causing the server to become unresponsive, impacting service availability.Details
The vulnerability resides in the regular expression
/<([^>]+)>; rel="deprecation"/, which is used to match thelinkheader in HTTP responses. This regular expression captures content between angle brackets (<>) followed by; rel="deprecation". However, the pattern is vulnerable to ReDoS (Regular Expression Denial of Service) attacks due to its susceptibility to catastrophic backtracking when processing malicious input.An attacker can exploit this vulnerability by sending a specially crafted
linkheader designed to trigger excessive backtracking. For example, the following headers:The crafted
linkheader consists of 100,000 consecutive<characters followed by a closing>. This input forces the regular expression engine to backtrack extensively in an attempt to match the pattern. As a result, the server can experience a significant increase in CPU usage, which may lead to denial of service, making the server unresponsive or even causing it to crash under load.The issue is present in the following code:
In this scenario, the
linkheader value triggers the regex to perform excessive backtracking, resulting in resource exhaustion and potentially causing the service to become unavailable.PoC
The gist of PoC.js
result:
Impact
This is a Denial of Service (DoS) vulnerability caused by a ReDoS (Regular Expression Denial of Service) flaw. The vulnerability allows an attacker to craft a malicious
linkheader that exploits the inefficient backtracking behavior of the regular expression used in the code.The primary impact is the potential for server resource exhaustion, specifically high CPU usage, which can cause the server to become unresponsive or even crash when processing the malicious request. This affects the availability of the service, leading to downtime or degraded performance.
The vulnerability impacts any system that uses this specific regular expression to process
linkheaders in HTTP responses. This can include:If left unpatched, the vulnerability can be exploited by any unauthenticated user who is able to send a specially crafted HTTP request with a malicious
linkheader, making it a low-barrier attack that could be exploited by anyone.Release Notes
octokit/request.js (@octokit/request)
v9.2.1Compare Source
Bug Fixes
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.