A vulnerability, which was classified as problematic, has been found in RocketChat up to 7.6.1. This issue affects the function parseMessage of the file /apps/meteor/app/irc/server/servers/RFC2813/parseMessage.js. The manipulation of the argument line leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
The product does not properly control the allocation and maintenance of a limited resource.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://vuldb.com/?id.311663 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.311663 | vdb entry signature permissions required |
https://vuldb.com/?submit.585751 | third party advisory vdb entry |
https://github.com/RocketChat/Rocket.Chat/pull/35711 | exploit patch issue tracking |
https://gist.github.com/mmmsssttt404/0fcda3b3e85edafc4eaa6816aa252deb | product exploit |