First published: Mon May 13 2024(Updated: )
Node.js braces module is vulnerable to a denial of service, caused by the failure to limit the number of characters it can handle. leading to a memory exhaustion in lib/parse.js. By sending imbalanced braces as input, the parsing will enter a loop causing the JavaScript heap limit to be reached, and the program will crash.
Credit: 596c5446-0ce5-4ba2-aa66-48b3b757a647 596c5446-0ce5-4ba2-aa66-48b3b757a647
Affected Software | Affected Version | How to fix |
---|---|---|
npm/braces | <3.0.3 | 3.0.3 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Update to version 3.0.3 to mitigate the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4068 has a high severity rating due to its potential for denial of service through memory exhaustion.
To fix CVE-2024-4068, upgrade the braces package to version 3.0.3 or apply relevant patches for affected IBM products.
CVE-2024-4068 is caused by the inability of the braces module to limit the number of characters in input, leading to infinite loops and memory issues.
CVE-2024-4068 affects the braces module in Node.js and IBM Cognos Analytics versions up to 12.0.3 and 11.2.4 FP4.
Yes, CVE-2024-4068 can be exploited remotely if an attacker can send specially crafted imbalanced braces as input.