taro is vulnerable to Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414 | issue tracking patch exploit third party advisory |
https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5 | third party advisory patch |