SB2021072624 - Denial of service in path-parse JavaScript library
Published: July 26, 2021 Updated: August 10, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Incorrect Regular Expression (CVE-ID: CVE-2021-23343)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation in splitDeviceRe, splitTailRe, and splitPathRe regular expressions. A remote attacker can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.
Remediation
Install update from vendor's website.
References
- https://github.com/jbgutierrez/path-parse/issues/8
- https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
- https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E
- https://github.com/advisories/GHSA-hj48-42vr-x3v9
- https://www.npmjs.com/advisories/1773