| const { ReDoSError, SECURITY_CONFIG } = require('./security-config');
|
| const vm = require('vm');
|
|
|
| |
| |
| |
|
|
| class ReDoSProtector {
|
| constructor() {
|
| this.config = SECURITY_CONFIG;
|
| this.timeout = this.config.REGEX_TIMEOUT;
|
|
|
|
|
| this.dangerousPatterns = [
|
|
|
| /(\w+)*$/,
|
| /(a+)+$/,
|
| /(a|a)*$/,
|
| /(a|ab)*$/,
|
|
|
|
|
| /(\d+)*\d+/,
|
| /(\w+)+\w+/,
|
|
|
|
|
| /(x+x+)+y/,
|
| /(.*.*)*$/
|
| ];
|
| }
|
|
|
| |
| |
| |
|
|
| testWithVMSandbox(regex, input, timeoutMs = this.timeout) {
|
| try {
|
|
|
| const sandbox = {
|
| regex: regex,
|
| input: input,
|
| result: null
|
| };
|
|
|
|
|
| const context = vm.createContext(sandbox);
|
|
|
|
|
| const code = 'result = regex.test(input);';
|
|
|
|
|
| const script = new vm.Script(code);
|
| script.runInContext(context, {
|
| timeout: timeoutMs,
|
| displayErrors: true
|
| });
|
|
|
| return sandbox.result;
|
| } catch (error) {
|
| if (error.code === 'ERR_SCRIPT_EXECUTION_TIMEOUT') {
|
| throw new ReDoSError(`Regex execution timeout (${timeoutMs}ms): possible ReDoS vulnerability`);
|
| }
|
| throw new ReDoSError(`Regex execution failed: ${error.message}`);
|
| }
|
| }
|
|
|
| |
| |
|
|
| matchWithVMSandbox(regex, input, timeoutMs = this.timeout) {
|
| try {
|
|
|
| const sandbox = {
|
| regex: regex,
|
| input: input,
|
| result: null
|
| };
|
|
|
|
|
| const context = vm.createContext(sandbox);
|
|
|
|
|
| const code = 'result = input.match(regex);';
|
|
|
|
|
| const script = new vm.Script(code);
|
| script.runInContext(context, {
|
| timeout: timeoutMs,
|
| displayErrors: true
|
| });
|
|
|
| return sandbox.result;
|
| } catch (error) {
|
| if (error.code === 'ERR_SCRIPT_EXECUTION_TIMEOUT') {
|
| throw new ReDoSError(`Regex execution timeout (${timeoutMs}ms): possible ReDoS vulnerability`);
|
| }
|
| throw new ReDoSError(`Regex execution failed: ${error.message}`);
|
| }
|
| }
|
|
|
| |
| |
| |
|
|
| testWithTimeout(regex, input, timeoutMs = this.timeout) {
|
| return new Promise((resolve, reject) => {
|
| const timeout = setTimeout(() => {
|
| reject(new ReDoSError(`Regex execution timeout (${timeoutMs}ms): possible ReDoS vulnerability`));
|
| }, timeoutMs);
|
|
|
| try {
|
| const result = regex.test(input);
|
| clearTimeout(timeout);
|
| resolve(result);
|
| } catch (error) {
|
| clearTimeout(timeout);
|
| reject(error);
|
| }
|
| });
|
| }
|
|
|
| |
| |
| |
|
|
| matchWithTimeout(regex, input, timeoutMs = this.timeout) {
|
| return new Promise((resolve, reject) => {
|
| const timeout = setTimeout(() => {
|
| reject(new ReDoSError(`Regex execution timeout (${timeoutMs}ms): possible ReDoS vulnerability`));
|
| }, timeoutMs);
|
|
|
| try {
|
| const result = input.match(regex);
|
| clearTimeout(timeout);
|
| resolve(result);
|
| } catch (error) {
|
| clearTimeout(timeout);
|
| reject(error);
|
| }
|
| });
|
| }
|
|
|
| |
| |
|
|
| isDangerous(regexPattern) {
|
| const patternStr = regexPattern.toString();
|
|
|
|
|
| if (/\([^)]*[*+]\)[*+]/.test(patternStr)) {
|
| return {
|
| dangerous: true,
|
| reason: 'Nested quantifiers detected',
|
| pattern: patternStr
|
| };
|
| }
|
|
|
|
|
| if (/\([^|]*\|[^)]*\)[*+]/.test(patternStr)) {
|
| return {
|
| dangerous: true,
|
| reason: 'Overlapping alternations with quantifiers',
|
| pattern: patternStr
|
| };
|
| }
|
|
|
|
|
| if (/\([^)]*[*+][^)]*\)[*+]/.test(patternStr)) {
|
| return {
|
| dangerous: true,
|
| reason: 'Repeated groups detected',
|
| pattern: patternStr
|
| };
|
| }
|
|
|
|
|
| if (/\((?:\.\*)+\)[*+]/.test(patternStr)) {
|
| return {
|
| dangerous: true,
|
| reason: 'Catastrophic backtracking pattern',
|
| pattern: patternStr
|
| };
|
| }
|
|
|
| return {
|
| dangerous: false,
|
| pattern: patternStr
|
| };
|
| }
|
|
|
| |
| |
|
|
| analyzeComplexity(regexPattern) {
|
| const patternStr = regexPattern.toString();
|
|
|
| const metrics = {
|
| length: patternStr.length,
|
| quantifiers: (patternStr.match(/[*+?{]/g) || []).length,
|
| groups: (patternStr.match(/\(/g) || []).length,
|
| alternations: (patternStr.match(/\|/g) || []).length,
|
| backtracking: 0,
|
| complexity: 'LOW'
|
| };
|
|
|
|
|
| metrics.backtracking = metrics.quantifiers * metrics.groups;
|
|
|
|
|
| if (metrics.backtracking > 20 || metrics.groups > 10) {
|
| metrics.complexity = 'HIGH';
|
| } else if (metrics.backtracking > 10 || metrics.groups > 5) {
|
| metrics.complexity = 'MEDIUM';
|
| }
|
|
|
| return metrics;
|
| }
|
|
|
| |
| |
|
|
| measureExecutionTime(regex, input) {
|
| const start = process.hrtime.bigint();
|
|
|
| try {
|
| regex.test(input);
|
| const end = process.hrtime.bigint();
|
| const duration = Number(end - start) / 1000000;
|
|
|
| return {
|
| success: true,
|
| duration,
|
| input: input.substring(0, 50) + (input.length > 50 ? '...' : '')
|
| };
|
| } catch (error) {
|
| return {
|
| success: false,
|
| error: error.message
|
| };
|
| }
|
| }
|
|
|
| |
| |
|
|
| testRegexSafety(regex) {
|
| const testInputs = [
|
| 'a'.repeat(10),
|
| 'a'.repeat(50),
|
| 'a'.repeat(100),
|
| 'a'.repeat(500),
|
| 'a'.repeat(1000),
|
| 'x'.repeat(100) + 'y',
|
| '1'.repeat(100),
|
| ' '.repeat(100),
|
| 'abc'.repeat(50)
|
| ];
|
|
|
| const results = [];
|
| let maxDuration = 0;
|
| let suspicious = false;
|
|
|
| for (const input of testInputs) {
|
| const result = this.measureExecutionTime(regex, input);
|
| results.push(result);
|
|
|
| if (result.success && result.duration > maxDuration) {
|
| maxDuration = result.duration;
|
| }
|
|
|
|
|
| if (result.success && result.duration > 100) {
|
| suspicious = true;
|
| }
|
| }
|
|
|
| return {
|
| maxDuration,
|
| suspicious,
|
| results: results.filter(r => r.success)
|
| };
|
| }
|
|
|
| |
| |
|
|
| scanCode(content) {
|
| const findings = [];
|
|
|
|
|
| const regexPatterns = [
|
|
|
| /\/([^\/\n]+)\/([gimuy]*)/g,
|
|
|
| /new\s+RegExp\s*\(\s*['"]([^'"]+)['"]/g
|
| ];
|
|
|
| regexPatterns.forEach(pattern => {
|
| let match;
|
| while ((match = pattern.exec(content)) !== null) {
|
| try {
|
| const regexStr = match[1];
|
| const flags = match[2] || '';
|
| const regex = new RegExp(regexStr, flags);
|
|
|
| const danger = this.isDangerous(regex);
|
| const complexity = this.analyzeComplexity(regex);
|
|
|
| if (danger.dangerous || complexity.complexity === 'HIGH') {
|
| findings.push({
|
| pattern: regex.toString(),
|
| line: content.substring(0, match.index).split('\n').length,
|
| dangerous: danger.dangerous,
|
| reason: danger.reason,
|
| complexity: complexity.complexity,
|
| metrics: complexity
|
| });
|
| }
|
| } catch (error) {
|
|
|
| }
|
| }
|
| });
|
|
|
| return findings;
|
| }
|
|
|
| |
| |
|
|
| generateReport(findings) {
|
| return {
|
| totalPatterns: findings.length,
|
| dangerous: findings.filter(f => f.dangerous).length,
|
| highComplexity: findings.filter(f => f.complexity === 'HIGH').length,
|
| mediumComplexity: findings.filter(f => f.complexity === 'MEDIUM').length,
|
| issues: findings.map(f => ({
|
| pattern: f.pattern,
|
| line: f.line,
|
| risk: f.dangerous ? 'HIGH' : f.complexity,
|
| reason: f.reason || `${f.complexity} complexity regex`
|
| }))
|
| };
|
| }
|
|
|
| |
| |
| |
|
|
| safeExec(regex, input, operation = 'test') {
|
| if (!this.config.ENABLE_REDOS_PROTECTION) {
|
|
|
| return operation === 'test' ? regex.test(input) : input.match(regex);
|
| }
|
|
|
| try {
|
|
|
| const danger = this.isDangerous(regex);
|
| if (danger.dangerous) {
|
| throw new ReDoSError(`Dangerous regex pattern detected: ${danger.reason}`);
|
| }
|
|
|
|
|
| if (operation === 'test') {
|
| return this.testWithVMSandbox(regex, input);
|
| } else {
|
| return this.matchWithVMSandbox(regex, input);
|
| }
|
| } catch (error) {
|
| if (error instanceof ReDoSError) {
|
| throw error;
|
| }
|
| throw new ReDoSError(`Regex execution failed: ${error.message}`);
|
| }
|
| }
|
|
|
| |
| |
|
|
| async safeExecAsync(regex, input, operation = 'test') {
|
| if (!this.config.ENABLE_REDOS_PROTECTION) {
|
|
|
| return operation === 'test' ? regex.test(input) : input.match(regex);
|
| }
|
|
|
| try {
|
|
|
| const danger = this.isDangerous(regex);
|
| if (danger.dangerous) {
|
| throw new ReDoSError(`Dangerous regex pattern detected: ${danger.reason}`);
|
| }
|
|
|
|
|
| if (operation === 'test') {
|
| return await this.testWithTimeout(regex, input);
|
| } else {
|
| return await this.matchWithTimeout(regex, input);
|
| }
|
| } catch (error) {
|
| if (error instanceof ReDoSError) {
|
| throw error;
|
| }
|
| throw new ReDoSError(`Regex execution failed: ${error.message}`);
|
| }
|
| }
|
| }
|
|
|
| module.exports = ReDoSProtector;
|
|
|