First published: Tue Sep 26 2023(Updated: )
Chai.js Assertion Library get-func-name is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw. By sending a specially crafted regex input, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/get-func-name | <2.0.1 | 2.0.1 |
redhat/get-func-name | <2.0.1 | 2.0.1 |
Chaijs Get-func-name | <2.0.1 | |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43646 is a vulnerability in the get-func-name module that allows potential DoS attacks due to excessive backtracking in the regex implementation.
CVE-2023-43646 has a severity score of 8.6, which is considered high.
CVE-2023-43646 affects get-func-name version 2.0.1.
To fix CVE-2023-43646, you should update get-func-name to version 2.0.1.
The references for CVE-2023-43646 are: [GitHub Commit](https://github.com/chaijs/get-func-name/commit/f934b228b5e2cb94d6c8576d3aac05493f667c69), [GitHub Security Advisory](https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-43646)