Summary
This project provides tools to scan your projects for vulnerable regexes. These are regexes that could lead to catastrophic backtracking.
Getting started
Local queries
- Set the environment variable
VULN_REGEX_DETECTOR_ROOT
to wherever you cloned the repo. - Run the
configure
script to install dependencies and build the detectors. - Use the scripts in
bin
. See their README for details.
Remote queries
If you don't want to install and run the detectors locally, you can use the vuln-regex-detector npm module.
This module uses the src/cache/client/npm
code to query a server hosted at Virginia Tech. The server is running the src/cache/server
code.
See the corresponding README for more details.
How it works
Scanning a project has three stages:
- Regex extraction
- Vulnerability detection
- Vulnerability validation
Regex extraction
In this stage regexes are statically extracted from the project's source code. See here for more details.
Vulnerability detection
In this stage the regexes are tested for vulnerability. See here for more details.
Testing regexes for vulnerability is expensive. As a result, the default configuration of this repo is to query a server to see if the regex has previously been tested for safety. See here for more details.
If this is a problem you can turn it off or direct queries to your own server by editing src/cache/.config.json
in your clone.
The source for the server is included in src/cache
.
Vulnerability validation
In this stage the results of the vulnerability tests are validated.
The vulnerability detectors are not always correct. Happily, each emits evil input it believes will trigger catastrophic backtracking. We have vulnerability validators to check their recommendation in the language(s) in which you will use the regexes.
See here for more details.
Pipelining
- The extraction stage produces a list of regexes. Each regex should be fed to the detection stage.
- The detection stage produces evil input from each detector. Each evil input should be fed in turn to the validation phase.
The scripts in bin/
implement this pipeline.
Caveats
In brief, let's review how the analysis works:
- Identify all statically-declared regexes used anywhere in your source code.
- Ask detectors what they think about each regex.
- For any regexes that any detectors flagged as vulnerable, validate in the appropriate language.
Here are the shortcomings of the analysis.
- Regex extraction: It is static. If you dynamically define regexes (e.g.
new Regex(patternAsAVariable)
) we do not know about it. - Regex extraction: It is input agnostic, so it detects vulnerable regexes whether or not they are currently exploitable. As long as a vulnerable regex is only used on trusted input, it will not be exploited. If a vulnerable regex is only used in test code, then it is not currently a problem. Judge for yourself how comfortable you feel about keeping non-exploitable vulnerable regexes in your code.
- Vulnerability detection: It is detector dependent. All of the detectors have their flaws, and none has received careful testing. Thanks to the validation stage we only report truly vulnerable regexes (high precision/no false positives), but there may be unreported vulnerabilities (risk of low recall/false negatives) e.g. due to bugs or timeouts in the detection stage.
Supported OSes
The configuration code supports Ubuntu directly (tested on Ubuntu 16), for other distros/OSes a container can be used (see Docker below). Everything else should work on any Linux. Open an issue if you want other distros/OSes and we can discuss.
Docker
A Dockerfile
is provided to make the code easier to configure on non-Ubuntu systems. The image can be built and used as follows:
$ docker build -t vuln-regex-detector .
$ docker run --rm -v /tmp/query:/query vuln-regex-detector bin/check-regex.pl /query/unsafe-1.json
where /tmp/query/unsafe-1.json
contains the pattern to be checked.
Contributing
Contributions welcome!
- If you find a bug, please open an issue.
- If you want to add a feature, open an issue to discuss first and to "claim the territory".
Enhancing the scan
If you want to enhance the scan, here are the instructions.
- If you want to add support for a new language, here are the instructions for regex extraction and for vulnerability validation.
- If you want to add a new vulnerability detector, see the instructions.