An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the uri-template-lite npm package, when an attacker is able to supply arbitrary input to the "URI.expand" method
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://research.jfrog.com/vulnerabilities/uri-template-lite-redos-xray-211351/ | third party advisory exploit |
https://github.com/litejs/uri-template-lite/compare/v22.1.0...v22.9.0 |