CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
4DescriptionNVD
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
AnalysisAI
A Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify, a TypeScript library for building ActivityPub federated servers, where maliciously crafted HTML responses can cause catastrophic backtracking in the document loader's HTML parsing regex. The vulnerability affects versions prior to 1.6.13, 1.7.14, 1.8.15, and 1.9.2, allowing remote attackers to cause denial of service without authentication. A public proof-of-concept exploit is available, though the EPSS score of 0.13% indicates relatively low exploitation likelihood in the wild.
Technical ContextAI
Fedify is a TypeScript library that enables developers to build federated server applications using the ActivityPub protocol, which powers decentralized social networks like Mastodon. The vulnerability stems from CWE-1333 (Inefficient Regular Expression Complexity) in the document loader component at packages/fedify/src/runtime/docloader.ts:259, where nested quantifiers in a regex pattern used for HTML parsing create exponential time complexity when processing specially crafted input. The affected products are identified through CPE as cpe:2.3:a:fedify:fedify:*:*:*:*:*:*:*:* for all vulnerable version ranges, specifically impacting applications that use Fedify's document loading functionality to process external HTML content.
RemediationAI
Upgrade Fedify to the patched versions based on your current branch: 1.6.13 for 1.6.x users, 1.7.14 for 1.7.x users, 1.8.15 for 1.8.x users, or 1.9.2 for 1.9.x users, with patches available at https://github.com/fedify-dev/fedify/releases/. The fixes are implemented in commits 2bdcb24d7d6d5886e0214ed504b63a6dc5488779 and bf2f0783634efed2663d1b187dc55461ee1f987a which address the regex complexity issue. As a temporary mitigation before patching, consider implementing request timeouts and rate limiting on endpoints that process external HTML content through Fedify's document loader, though upgrading remains the recommended solution.
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-rchf-xwx2-hm93