High

chuanhuchatgpt

ReDoS Vulnerability in Chat History Filtering via Regular Expression Injection

A ReDoS vulnerability was identified in the latest version of the chat history filtering function, which was patched in the subsequent release. The vulnerability allows an attacker to inject a malicious regular expression, causing significant delays in processing.

Available publicly on Jun 25 2024

7.5

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Credit:

fatmo666
Threat Overview

The vulnerability exists in the filter_history function, which filters chat history based on user-provided keywords. The function uses the re.search method without sanitizing the input keyword, allowing an attacker to inject a complex regular expression. This can lead to a Regular Expression Denial of Service (ReDoS) by causing excessive backtracking, significantly slowing down or even halting the system.

Attack Scenario

An attacker could exploit this vulnerability by submitting a specially crafted regular expression as the keyword in the chat history search. For example, using the regex A(B|C+)+D against a chat history entry named ACCCCCCCCCCCCCCCCCCCCCCCCCCCCCE would cause the system to take an excessively long time to process the request, leading to a denial of service.

Who is affected

Users of the latest version of the chat application who utilize the chat history filtering feature are affected. This includes both individual users and organizations relying on the service for communication.

Technical Report
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.