The parsejson module is vulnerable to regular expression denial of service when untrusted user input is passed into it to be parsed.
The product does not properly control the allocation and maintenance of a limited resource.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://nodesecurity.io/advisories/528 | third party advisory |
https://github.com/get/parsejson/issues/4 | issue tracking exploit third party advisory |