First published: Wed Jan 04 2023(Updated: )
# Impact Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This is the same bug as Moment's https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g # Workarounds Limit the length of the input. # References There is an excellent writeup of the same issue in Moment: https://github.com/moment/moment/pull/6015#issuecomment-1152961973 # Details `DateTime.fromRFC2822("(".repeat(500000))` takes a couple minutes to complete.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Momentjs Luxon | >=1.0.0<1.28.1 | |
Momentjs Luxon | >=2.0.0<2.5.2 | |
Momentjs Luxon | >=3.0.0<3.2.1 | |
npm/luxon | >=1.0.0<1.28.1 | 1.28.1 |
npm/luxon | >=3.0.0<3.2.1 | 3.2.1 |
npm/luxon | >=2.0.0<2.5.2 | 2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22467 is a vulnerability in the luxon package that leads to a regular expression denial of service.
The vulnerability affects Luxon versions 1.x prior to 1.38.1, 2.x prior to 2.5.2, and 3.x prior to 3.2.1.
Luxon is a JavaScript library used for working with dates and times.
CVE-2023-22467 has a severity rating of high (7) based on the Common Vulnerability Scoring System (CVSS) v3.0.
To fix CVE-2023-22467, upgrade Luxon to version 1.38.1 for 1.x branch, 2.5.2 for 2.x branch, or 3.2.1 for 3.x branch.