First published: Wed Oct 11 2017(Updated: )
Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter. As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue. This was later re-introduced in version v3.2.0, and then repatched in versions 3.2.7 and 4.3.1. ## Recommendation Version 2.x.x: Update to version 2.6.9 or later. Version 3.1.x: Update to version 3.1.0 or later. Version 3.2.x: Update to version 3.2.7 or later. Version 4.x.x: Update to version 4.3.1 or later.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debug Project Debug | >=2.0.0<2.6.9 | |
Debug Project Debug | >=3.0.0<3.1.0 | |
redhat/nodejs-debug | <2.6.9 | 2.6.9 |
redhat/nodejs-debug | <3.1.0 | 3.1.0 |
npm/debug | >=4.0.0<4.3.1 | 4.3.1 |
npm/debug | >=3.2.0<3.2.7 | 3.2.7 |
npm/debug | >=3.0.0<3.1.0 | 3.1.0 |
npm/debug | <2.6.9 | 2.6.9 |
<=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-16137 is medium with a severity value of 5.3.
Versions 2.0.0 to 2.6.9, 3.0.0 to 3.1.0, and 4.0.0 to 4.3.1 of debug are affected by CVE-2017-16137.
CVE-2017-16137 is a regular expression denial of service vulnerability in the debug module of Node.js.
To fix CVE-2017-16137, update the debug module to version 2.6.9, 3.1.0, or 4.3.1, depending on the version you are using.
You can find more information about CVE-2017-16137 on the NVD NIST page (https://nvd.nist.gov/vuln/detail/CVE-2017-16137) and on the GitHub issues (https://github.com/visionmedia/debug/issues/501) and pull request (https://github.com/visionmedia/debug/pull/504) for debug.