CVE Vulnerabilities

CVE-2023-26115

Inefficient Regular Expression Complexity

Published: Jun 22, 2023 | Modified: Feb 13, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
Word-wrapWord-wrap_project*1.2.4 (excluding)
NETWORK-OBSERVABILITY-1.4.0-RHEL-9RedHatnetwork-observability/network-observability-console-plugin-rhel9:v1.4.0-42*
NETWORK-OBSERVABILITY-1.4.0-RHEL-9RedHatnetwork-observability/network-observability-ebpf-agent-rhel9:v1.4.0-42*
NETWORK-OBSERVABILITY-1.4.0-RHEL-9RedHatnetwork-observability/network-observability-flowlogs-pipeline-rhel9:v1.4.0-42*
NETWORK-OBSERVABILITY-1.4.0-RHEL-9RedHatnetwork-observability/network-observability-operator-bundle:1.4.0-55*
NETWORK-OBSERVABILITY-1.4.0-RHEL-9RedHatnetwork-observability/network-observability-rhel9-operator:v1.4.0-42*
Red Hat Migration Toolkit for Containers 1.8RedHatrhmtc/openshift-migration-ui-rhel8:v1.8.0-7*
Red Hat OpenShift Container Platform 4.14RedHatopenshift4/ose-monitoring-plugin-rhel8:v4.14.0-202310201027.p0.g8757197.assembly.stream*
Red Hat OpenShift Container Platform 4.14RedHatopenshift4/nmstate-console-plugin-rhel8:v4.14.0-202312011333.p0.g8dc4a62.assembly.stream*
Red Hat OpenShift GitOps 1.13RedHatopenshift-gitops-1/console-plugin-rhel8:v1.13.2-4*
Red Hat OpenShift GitOps 1.14RedHatopenshift-gitops-1/console-plugin-rhel8:v1.14.0-16*
Red Hat OpenShift GitOps 1.15RedHatopenshift-gitops-1/console-plugin-rhel8:v1.15.0-15*
RHODF-4.13-RHEL-9RedHatodf4/odf-console-rhel9:v4.13.3-1*
RHOL-5.7-RHEL-8RedHatopenshift-logging/logging-view-plugin-rhel8:v5.7.3-6*

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References