Lucene search

K
githubGitHub Advisory DatabaseGHSA-4XQQ-73WG-5MJP
HistoryMay 15, 2023 - 6:30 a.m.

git-url-parse Regular Expression Denial of Service

2023-05-1506:30:19
CWE-1333
GitHub Advisory Database
github.com
6
git-url-parse
regular expression denial of service
semgrep

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

43.7%

giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package’s author placed a ReDoS attack payload in a URL used by the package.

Affected configurations

Vulners
Node
git-url-parse_projectgit-url-parseRange1.2.2rust
VendorProductVersionCPE
git-url-parse_projectgit-url-parse*cpe:2.3:a:git-url-parse_project:git-url-parse:*:*:*:*:*:rust:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

43.7%

Related for GHSA-4XQQ-73WG-5MJP