cvelist/2022/25xxx/CVE-2022-25918.json

106 lines
3.7 KiB
JSON
Raw Normal View History

2022-02-24 15:04:37 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
2022-10-27 01:00:06 -04:00
"ASSIGNER": "report@snyk.io",
"DATE_PUBLIC": "2022-10-27T05:00:01.622197Z",
2022-02-24 15:04:37 +00:00
"ID": "CVE-2022-25918",
2022-10-27 01:00:06 -04:00
"STATE": "PUBLIC",
"TITLE": "Regular Expression Denial of Service (ReDoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "shescape",
"version": {
"version_data": [
{
"version_affected": ">=",
"version_value": "1.5.10"
},
{
"version_affected": "<",
"version_value": "1.6.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Regular Expression Denial of Service (ReDoS)"
}
]
}
]
},
"references": {
"reference_data": [
{
2022-10-27 10:00:30 +00:00
"refsource": "MISC",
"url": "https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-3061108",
"name": "https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-3061108"
2022-10-27 01:00:06 -04:00
},
{
2022-10-27 10:00:30 +00:00
"refsource": "MISC",
"url": "https://github.com/ericcornelissen/shescape/blob/main/src/unix.js%23L52",
"name": "https://github.com/ericcornelissen/shescape/blob/main/src/unix.js%23L52"
2022-10-27 01:00:06 -04:00
},
{
2022-10-27 10:00:30 +00:00
"refsource": "MISC",
"url": "https://github.com/ericcornelissen/shescape/commit/552e8eab56861720b1d4e5474fb65741643358f9",
"name": "https://github.com/ericcornelissen/shescape/commit/552e8eab56861720b1d4e5474fb65741643358f9"
2022-10-27 01:00:06 -04:00
},
{
2022-10-27 10:00:30 +00:00
"refsource": "MISC",
"url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.6.1",
"name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.6.1"
2022-10-27 01:00:06 -04:00
}
]
2022-02-24 15:04:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-10-27 10:00:30 +00:00
"value": "The package shescape from 1.5.10 and before 1.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the escape function in index.js, due to the usage of insecure regex in the escapeArgBash function."
2022-02-24 15:04:37 +00:00
}
]
2022-10-27 01:00:06 -04:00
},
"impact": {
"cvss": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
}
},
"credit": [
{
"lang": "eng",
"value": "Elliot Ward - Snyk Research Team"
}
]
2022-02-24 15:04:37 +00:00
}