Lucene search

K
cveGitHub_MCVE-2024-45296
HistorySep 09, 2024 - 7:15 p.m.

CVE-2024-45296

2024-09-0919:15:13
CWE-1333
GitHub_M
web.nvd.nist.gov
39
20
exploi vulnerability thread regex match dos upgrade segment separation period.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

16.3%

path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.

Affected configurations

Vulners
Vulnrichment
Node
pillarjspath_to_regexpRange<0.1.10
OR
pillarjspath_to_regexpRange0.2.08.0.0
VendorProductVersionCPE
pillarjspath_to_regexp*cpe:2.3:a:pillarjs:path_to_regexp:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "pillarjs",
    "product": "path-to-regexp",
    "versions": [
      {
        "version": "< 0.1.10",
        "status": "affected"
      },
      {
        "version": ">= 0.2.0, < 8.0.0",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

16.3%