First published: Thu Dec 05 2024(Updated: )
### Impact The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of `path-to-regexp`, originally reported in CVE-2024-45296 ### Patches Upgrade to 0.1.12. ### Workarounds Avoid using two parameters within a single path segment, when the separator is not `.` (e.g. no `/:a-:b`). Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking. ### References - https://github.com/advisories/GHSA-9wv6-86v2-598j - https://blakeembrey.com/posts/2024-09-web-redos/
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/path-to-regexp | <0.1.12 | 0.1.12 |
IBM Cognos Controller | <=11.1.0 | |
IBM Cognos Controller | <=11.0.0 - 11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52798 has a moderate severity due to the potential for Denial of Service from backtracking in regular expressions.
To fix CVE-2024-52798, upgrade the 'path-to-regexp' package to version 0.1.12 or later.
CVE-2024-52798 affects versions before 0.1.12 of the 'path-to-regexp' package.
CVE-2024-52798 is caused by a vulnerable regular expression that allows for excessive backtracking.
As a workaround for CVE-2024-52798, avoid using two parameters within a single path segment.