A vulnerability classified as problematic was found in Unitech pm2 up to 6.0.6. This vulnerability affects unknown code of the file /lib/tools/Config.js. The manipulation leads to inefficient regular expression complexity. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
The product does not properly control the allocation and maintenance of a limited resource.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://vuldb.com/?id.311662 | third party advisory vdb entry |
https://vuldb.com/?ctiid.311662 | vdb entry signature permissions required |
https://vuldb.com/?submit.585750 | third party advisory vdb entry |
https://github.com/Unitech/pm2/pull/5971 | exploit patch issue tracking |
https://gist.github.com/mmmsssttt404/407e2ffe3e0eaa393ad923a86316a385 | product exploit |