All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067 | third party advisory exploit |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028 | third party advisory exploit |
https://github.com/jbgutierrez/path-parse/issues/8 | third party advisory issue tracking exploit |
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85%40%3Cdev.myfaces.apache.org%3E | mailing list |