First published: Thu Oct 06 2022(Updated: )
A flaw was found in loader-utils webpack library. When the url variable from interpolateName is set, the prototype can be polluted. This issue could lead to a regular expression Denial of Service (ReDoS), affecting the availability of the affected component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
npm/loader-utils | >=3.0.0<3.2.1 | 3.2.1 |
npm/loader-utils | >=2.0.0<2.0.4 | 2.0.4 |
npm/loader-utils | >=1.0.0<1.4.2 | 1.4.2 |
Webpack | <1.4.2 | |
Webpack | >=2.0.0<2.0.4 | |
Webpack | >=3.0.0<3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-37603 is a Regular expression denial of service (ReDoS) vulnerability in webpack loader-utils.
CVE-2022-37603 affects the loader-utils package in webpack with versions between 1.0.0 and 3.2.1.
CVE-2022-37603 has a severity rating of 7.5 (High).
To fix CVE-2022-37603, update the loader-utils package to version 3.2.1 or later.
You can find more information about CVE-2022-37603 at the following references: - [CVE-2022-37603 on CVE.org](https://www.cve.org/CVERecord?id=CVE-2022-37603) - [CVE-2022-37603 on NIST](https://nvd.nist.gov/vuln/detail/CVE-2022-37603) - [Bugzilla Entry](https://bugzilla.redhat.com/show_bug.cgi?id=2140597) - [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2023:0471)