Lucene search

K
githubGitHub Advisory DatabaseGHSA-8H55-Q5QQ-P685
HistoryJul 23, 2024 - 2:10 p.m.

(ReDoS) Regular Expression Denial of Service in tf2-item-format

2024-07-2314:10:45
CWE-624
CWE-1333
GitHub Advisory Database
github.com
6
regular expression denial of service
tf2-item-format
version 4.2.6
version 5.9.14
dos attacks
parsing user input.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

16.1%

Summary

Versions of tf2-item-format since at least 4.2.6 are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input.

Tested Versions

  • 5.9.13
  • 5.8.10
  • 5.7.0
  • 5.6.17
  • 4.3.5
  • 4.2.6

v5

Upgrade package to ^5.9.14

v4

No patch exists. Please consult the v4 to v5 migration guide to upgrade to v5.

If upgrading to v5 is not possible, fork the module repository and implement the fix detailed below.

Impact

This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any tf2-item-format to parse user input.

Affected configurations

Vulners
Node
tf2-item-formatRange4.2.65.9.13
VendorProductVersionCPE
*tf2-item-format*cpe:2.3:a:*:tf2-item-format:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

16.1%

Related for GHSA-8H55-Q5QQ-P685