index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters.
References
Link | Resource |
---|---|
https://bugs.debian.org/862712 | Third Party Advisory |
https://github.com/juliangruber/brace-expansion/issues/33 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3 | Patch Third Party Advisory |
https://nodesecurity.io/advisories/338 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-01-27 12:29
Updated : 2024-02-04 19:46
NVD link : CVE-2017-18077
Mitre link : CVE-2017-18077
CVE.ORG link : CVE-2017-18077
JSON object : View
Products Affected
brace_expansion_project
- brace_expansion
CWE
CWE-20
Improper Input Validation