Is it safe to pass user input through rails gsub?
Are there risks associated with using gsub on user input? Can it be used for regular expression DoS?
Continue reading Is it safe to pass user input through rails gsub?
Collaborate Disseminate
Are there risks associated with using gsub on user input? Can it be used for regular expression DoS?
Continue reading Is it safe to pass user input through rails gsub?
OWASP defines “evil regex” (here) as follows:
Evil Regexes
A Regex is called “evil” if it can stuck on crafted input.
Evil Regex pattern contains:
Grouping with repetition
Inside the repeat… Continue reading Regex DoS: Is OWASP’s characterization of "evil regexes" complete?
$filename = $_GET[‘filename’];
if(preg_match(“/[^a-z\.]/”, $filename) == 1) {
echo “Hacker”;
die();
}
It can only include a file for this topic, but this file contains numbers. It has to be byp… Continue reading Please help me understand this PHP hack,how can i bypass this re
Some context
I’m currently building an application which lets user’s set up dynamic, queries they can execute later. A great addition to this seems like a regex module, in which users can filter based on a given regular expr… Continue reading What is the risk of allowing user input in Python’s ‘re’ module
I am trying to run sqlmap in order to find a flag for a CTF. The injection string is sent via a POST request in the parameter called search. The response is received as either 1, 2, or 3 (error codes), or flag{flag_name} (suc… Continue reading Boolean blind SQLi with sqlmap
We are happy to announce the release of CapLoader 1.8 today! CapLoader is primarily used to filter, slice and dice large PCAP datasets into smaller ones. This new version contains several new features that improves this filtering functionality even fur… Continue reading CapLoader 1.8 Released
I want to create some functionality for non dangerous regex.
I want to accept only very few regex cases where it is safe to assume that they are not malicious (but still giving the user some flexibility).
Is this possible avoiding the [(+… Continue reading Can a Regex without characters [(+*{}? be dangerous?
i want to creating xss filter for my own project, this is for html event filtering
preg_replace(“/ on\w+='[^’]*’/i”, ”, preg_replace(‘/ on\w+=”[^”]*”/i’, ”, $framed));
but considering to more efective way, i would thin… Continue reading How to filter HTML Event in Native PHP7
FindBugs flagged the following email address validation regex as vulnerable to DoS:
^[\w!#$%&’*+/=?`{|}~^-]+(?:\.[\w!#$%&’*+/=?`{|}~^-]+)*@(?:[a-zA-Z0-9-]+\.)+[a-zA-Z]{2,6}$
Here’s an easier to read version that su… Continue reading Is this regular expression vulnerable to DoS?
FindBugs flagged the following email address validation regex as vulnerable to DoS:
^[\w!#$%&’*+/=?`{|}~^-]+(?:\.[\w!#$%&’*+/=?`{|}~^-]+)*@(?:[a-zA-Z0-9-]+\.)+[a-zA-Z]{2,6}$
Here’s an easier to read version that su… Continue reading Is this regular expression vulnerable to DoS?