←back to thread

200 points dcu | 2 comments | | HN request time: 0.406s | source
1. theyknowitsxmas ◴[] No.44456705[source]
This screams regex injection
replies(1): >>44457815 #
2. zserge ◴[] No.44457815[source]
You might be right, but the only place where regexps are applied in code is for validating resource text fields (which is optional). Those regexps are defined in read-only schemas by the developer (if needed). Schemas are immutable. There seems to be absolutely no connection between the data transmitted over the API (i.e. what user can inject) and regexps. I'm not dismissing the idea that there might be plenty of other possible vulnerabilities in other areas of this toy project.