code-server is vulnerable to Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223 | issue tracking patch exploit third party advisory |
https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5 | third party advisory patch |