View all vulnerabilities

CVE-2023-22467

Luxon Inefficient Regular Expression Complexity vulnerability

# ImpactLuxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks.This is the same bug as Moment's https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g# WorkaroundsLimit the length of the input.# ReferencesThere is an excellent writeup of the same issue in Moment: https://github.com/moment/moment/pull/6015#issuecomment-1152961973# Details`DateTime.fromRFC2822("(".repeat(500000))` takes a couple minutes to complete.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Versions
luxon >= 1.0.0 < 1.28.1; luxon >= 2.0.0 < 2.5.2; luxon >= 3.0.0 < 3.2.1
Severity
High
Ecosystem
JavaScript
Publish Date
January 9, 2023
Modified Date
January 14, 2025