Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795 | patch third party advisory exploit |
https://github.com/npm/node-semver/blob/main/internal/re.js%23L160 | broken link |
https://github.com/npm/node-semver/blob/main/internal/re.js%23L138 | broken link |
https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104 | broken link |
https://github.com/npm/node-semver/pull/564 | patch vendor advisory |
https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441 | patch |
https://security.netapp.com/advisory/ntap-20241025-0004/ |