ghsa-545q-3fg6-48m7
Vulnerability from github
Published
2021-03-18 19:39
Modified
2023-09-12 20:51
Severity ?
Summary
html-parse-stringify and html-parse-stringify2 vulnerable to Regular expression denial of service (ReDoS)
Details
This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "html-parse-stringify" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.0.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "html-parse-stringify2" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "2.0.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-23346" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2021-03-12T23:03:51Z", "nvd_published_at": "2021-03-04T17:15:00Z", "severity": "MODERATE" }, "details": "This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.", "id": "GHSA-545q-3fg6-48m7", "modified": "2023-09-12T20:51:14Z", "published": "2021-03-18T19:39:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23346" }, { "type": "WEB", "url": "https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12" }, { "type": "WEB", "url": "https://github.com/HenrikJoreteg/html-parse-stringify/blob/master/lib/parse.js%23L2" }, { "type": "WEB", "url": "https://github.com/HenrikJoreteg/html-parse-stringify/releases/tag/v2.0.1" }, { "type": "WEB", "url": "https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.js%23L2" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ], "summary": "html-parse-stringify and html-parse-stringify2 vulnerable to Regular expression denial of service (ReDoS)" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.