An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the uri-template-lite npm package, when an attacker is able to supply arbitrary input to the "URI.expand" method
References
Link | Resource |
---|---|
https://github.com/litejs/uri-template-lite/compare/v22.1.0...v22.9.0 | |
https://research.jfrog.com/vulnerabilities/uri-template-lite-redos-xray-211351/ | Exploit Third Party Advisory |
https://github.com/litejs/uri-template-lite/compare/v22.1.0...v22.9.0 | |
https://research.jfrog.com/vulnerabilities/uri-template-lite-redos-xray-211351/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/litejs/uri-template-lite/compare/v22.1.0...v22.9.0 - | |
References | () https://research.jfrog.com/vulnerabilities/uri-template-lite-redos-xray-211351/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Jul 2023, 13:53
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1333 |
Information
Published : 2022-08-24 16:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43309
Mitre link : CVE-2021-43309
CVE.ORG link : CVE-2021-43309
JSON object : View
Products Affected
litejs
- uri-template-lite
CWE
CWE-1333
Inefficient Regular Expression Complexity