First published: Tue Jun 06 2023(Updated: )
### Impact "fast-xml-parser" allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. ### Patches The problem has been resolved in v4.2.4 ### Workarounds Avoid using DOCTYPE parsing by `processEntities: false` option.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fast-xml-parser Project Fast-xml-parser | <4.2.4 | |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 | |
redhat/fast-xml-parser | <4.2.4 | 4.2.4 |
npm/fast-xml-parser | >=4.1.3<4.2.4 | 4.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-34104.
The severity of CVE-2023-34104 is high with a CVSS score of 7.5.
The vulnerability in fast-xml-parser allows for a denial of service attack caused by a regular expression denial of service (ReDoS) vulnerability.
Versions up to but excluding 4.2.4 of fast-xml-parser are affected.
To fix the vulnerability in fast-xml-parser, update to version 4.2.4 or later.