This repository has been archived by the owner on Apr 8, 2024. It is now read-only.
CVE-2021-43307 (High) detected in semver-regex-2.0.0.tgz #240
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-43307 - High Severity Vulnerability
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex/-/semver-regex-2.0.0.tgz
Path to dependency file: /generic-oauth/package.json
Path to vulnerable library: /tmp/git/generic-oauth/node_modules/semver-regex/package.json
Dependency Hierarchy:
Found in HEAD commit: 5659a71a1e87dc48bd960374e2cec8605f1dde08
Found in base branch: master
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the semver-regex npm package, when an attacker is able to supply arbitrary input to the test() method
Publish Date: 2022-06-02
URL: CVE-2021-43307
Base Score Metrics:
Type: Upgrade version
Origin: https://research.jfrog.com/vulnerabilities/semver-regex-redos-xray-211349/
Release Date: 2022-06-02
Fix Resolution (semver-regex): 3.1.4
Direct dependency fix Resolution (semantic-release): 17.3.1
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: