First published: Fri Nov 08 2024(Updated: )
Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
npm/cross-spawn | <6.0.6 | 6.0.6 |
npm/cross-spawn | >=7.0.0<7.0.5 | 7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21538 is classified as a Regular Expression Denial of Service (ReDoS) vulnerability.
To fix CVE-2024-21538, update the cross-spawn package to version 7.0.5 or later.
CVE-2024-21538 affects versions of the cross-spawn package prior to 7.0.5.
An attacker can exploit CVE-2024-21538 to cause excessive CPU usage and potentially crash the application.
Yes, improper input sanitization is the root cause of the vulnerability in CVE-2024-21538.