First published: Tue Jan 12 2021(Updated: )
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs-nodemon | <0:2.0.19-1.el9_0 | 0:2.0.19-1.el9_0 |
redhat/rh-nodejs14-nodejs-nodemon | <0:2.0.3-5.el7 | 0:2.0.3-5.el7 |
redhat/rh-nodejs12-nodejs | <0:12.22.5-1.el7 | 0:12.22.5-1.el7 |
redhat/rh-nodejs12-nodejs-nodemon | <0:2.0.3-5.el7 | 0:2.0.3-5.el7 |
redhat/ovirt-engine-ui-extensions | <0:1.2.7-1.el8e | 0:1.2.7-1.el8e |
redhat/ovirt-web-ui | <0:1.7.2-1.el8e | 0:1.7.2-1.el8e |
redhat/nodejs-glob-parent | <5.1.2 | 5.1.2 |
Gulpjs Glob-parent | <5.1.2 | |
Oracle Communications Cloud Native Core Policy | =1.14.0 | |
npm/glob-parent | >=4.0.0<5.1.2 | 5.1.2 |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-28469 is a vulnerability in the package glob-parent before version 5.1.2. It is susceptible to Regular Expression Denial of Service (ReDoS) attacks.
CVE-2020-28469 allows an attacker to cause a denial of service by supplying a malicious string to the glob-parent function.
CVE-2020-28469 has a severity rating of 7.5 (high).
To fix CVE-2020-28469, update the glob-parent package to version 5.1.2 or higher.
You can find more information about CVE-2020-28469 at the following references: [CVE-2020-28469](https://www.cve.org/CVERecord?id=CVE-2020-28469), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-28469), [Snyk](https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1945459), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2021:3016).