cvelist/2017/16xxx/CVE-2017-16117.json

68 lines
2.1 KiB
JSON
Raw Normal View History

2017-10-29 14:04:06 -04:00
{
2019-03-18 02:41:32 +00:00
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"DATE_PUBLIC": "2018-04-26T00:00:00",
"ID": "CVE-2017-16117",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "slug node module",
"version": {
"version_data": [
{
"version_value": "All versions"
}
]
}
}
]
},
"vendor_name": "HackerOne"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-06-06 19:53:46 -04:00
{
2019-03-18 02:41:32 +00:00
"lang": "eng",
"value": "slug is a module to slugify strings, even if they contain unicode. slug is vulnerable to regular expression denial of service is specially crafted untrusted input is passed as input. About 50k characters can block the event loop for 2 seconds."
2018-06-06 19:53:46 -04:00
}
2019-03-18 02:41:32 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service (CWE-400)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/dodo/node-slug/issues/82",
"refsource": "MISC",
"url": "https://github.com/dodo/node-slug/issues/82"
},
{
"name": "https://nodesecurity.io/advisories/537",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/537"
}
]
}
}