CVE-2022-36064

Public Exploit
Shescape Inefficient Regular Expression Complexity vulnerability

Description

Shescape is a shell escape package for JavaScript. An Inefficient Regular Expression Complexity vulnerability impacts users that use Shescape to escape arguments for the Unix shells `Bash` and `Dash`, or any not-officially-supported Unix shell; and/or using the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. An attacker can cause polynomial backtracking or quadratic runtime in terms of the input string length due to two Regular Expressions in Shescape that are vulnerable to Regular Expression Denial of Service (ReDoS). This bug has been patched in v1.5.10. For `Dash` only, this bug has been patched since v1.5.9. As a workaround, a maximum length can be enforced on input strings to Shescape to reduce the impact of the vulnerability. It is not recommended to try and detect vulnerable input strings, as the logic for this may end up being vulnerable to ReDoS itself.

Categories

5.9
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.08%
Third-Party Advisory github.com Third-Party Advisory github.com Third-Party Advisory github.com
Affected: ericcornelissen shescape
Published at:
Updated at:

References

Link Tags
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-gp75-h7j6-5pv3 exploit mitigation third party advisory issue tracking
https://github.com/ericcornelissen/shescape/pull/373 patch third party advisory issue tracking
https://github.com/ericcornelissen/shescape/releases/tag/v1.5.10 third party advisory release notes

Frequently Asked Questions

What is the severity of CVE-2022-36064?
CVE-2022-36064 has been scored as a medium severity vulnerability.
How to fix CVE-2022-36064?
To fix CVE-2022-36064, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-36064 being actively exploited in the wild?
It is possible that CVE-2022-36064 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-36064?
CVE-2022-36064 affects ericcornelissen shescape.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.