First published: Tue May 04 2021(Updated: )
A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-nodejs14-nodejs | <0:14.17.5-1.el7 | 0:14.17.5-1.el7 |
redhat/rh-nodejs12-nodejs | <0:12.22.5-1.el7 | 0:12.22.5-1.el7 |
redhat/rh-nodejs12-nodejs-nodemon | <0:2.0.3-5.el7 | 0:2.0.3-5.el7 |
redhat/ovirt-engine-ui-extensions | <0:1.2.7-1.el8e | 0:1.2.7-1.el8e |
Path-parse Project Path-parse | <1.0.7 | |
redhat/path-parse | <1.0.7 | 1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-23343
The severity of CVE-2021-23343 is medium with a CVSS score of 5.3.
All versions up to and including 1.0.7 of the path-parse package are affected. Additionally, versions 0:14.17.5-1.el7 and 0:12.22.5-1.el7 of rh-nodejs14-nodejs and rh-nodejs12-nodejs respectively are also affected.
An attacker can exploit CVE-2021-23343 by sending a specially-crafted request via certain regular expressions, causing a regular expression denial of service (ReDoS).
To fix CVE-2021-23343, it is recommended to update the path-parse package to version 1.0.8 or later. For rh-nodejs14-nodejs and rh-nodejs12-nodejs, update to versions 0:14.17.6-1.el7 and 0:12.22.6-1.el7 respectively.