First published: Tue Jul 10 2018(Updated: )
The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mongodb Js-bson | >=0.5.0<1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13863 is a vulnerability in the MongoDB bson JavaScript module (js-bson), versions 0.5.0 to 1.0.x before 1.0.5, that allows for a Regular Expression Denial of Service (ReDoS) in the lib/bson/decimal128.js file.
The severity of CVE-2018-13863 is high with a CVSS severity score of 7.5.
CVE-2018-13863 affects the MongoDB bson JavaScript module (js-bson) versions 0.5.0 to 1.0.x before 1.0.5, as well as the Mongodb Js-bson package.
The fix for CVE-2018-13863 is to update the affected software to version 1.0.5 or later.
Yes, you can find more information about CVE-2018-13863 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2018-13863), [GitHub Commit](https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a), [GitHub Advisory](https://github.com/advisories/GHSA-8462-q7x7-g2x4).