cve/2023/CVE-2023-26115.md
2024-05-25 21:48:12 +02:00

23 lines
1.0 KiB
Markdown

### [CVE-2023-26115](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26115)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.npm%3Aword-wrap&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=word-wrap&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen)
### Description
All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657
- https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973
#### Github
- https://github.com/git-kick/ioBroker.e3dc-rscp
- https://github.com/martinjackson/simple-widgets
- https://github.com/seal-community/patches
- https://github.com/sebhildebrandt/word-wrap-next