Lucene search

K
cve[email protected]CVE-2023-23925
HistoryFeb 03, 2023 - 8:15 p.m.

CVE-2023-23925

2023-02-0320:15:10
CWE-400
CWE-1333
web.nvd.nist.gov
39
switcher client
sdk
vulnerability
redos attack
patch
strategy
regex
exist
not_exist

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

38.1%

Switcher Client is a JavaScript SDK to work with Switcher API which is cloud-based Feature Flag. Unsanitized input flows into Strategy match operation (EXIST), where it is used to build a regular expression. This may result in a Regular expression Denial of Service attack (reDOS). This issue has been patched in version 3.1.4. As a workaround, avoid using Strategy settings that use REGEX in conjunction with EXIST and NOT_EXIST operations.

Affected configurations

Vulners
NVD
Node
switcherapiswitcher_clientRange<3.1.4
VendorProductVersionCPE
switcherapiswitcher_client*cpe:2.3:a:switcherapi:switcher_client:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "switcherapi",
    "product": "switcher-client-master",
    "versions": [
      {
        "version": "< 3.1.4",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

38.1%

Related for CVE-2023-23925