Switcher Client is a JavaScript SDK to work with Switcher API which is cloud-based Feature Flag. Unsanitized input flows into Strategy match operation (EXIST), where it is used to build a regular expression. This may result in a Regular expression Denial of Service attack (reDOS). This issue has been patched in version 3.1.4. As a workaround, avoid using Strategy settings that use REGEX in conjunction with EXIST and NOT_EXIST operations.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-0812 Switcher Client is a JavaScript SDK to work with Switcher API which is cloud-based Feature Flag. Unsanitized input flows into Strategy match operation (EXIST), where it is used to build a regular expression. This may result in a Regular expression Denial of Service attack (reDOS). This issue has been patched in version 3.1.4. As a workaround, avoid using Strategy settings that use REGEX in conjunction with EXIST and NOT_EXIST operations.
Github GHSA Github GHSA GHSA-wqxw-8h5g-hq56 Switcher Client contains Regular Expression Denial of Service (ReDoS)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 10 Mar 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-03-10T21:17:13.979Z

Reserved: 2023-01-19T21:12:31.358Z

Link: CVE-2023-23925

cve-icon Vulnrichment

Updated: 2024-08-02T10:42:27.101Z

cve-icon NVD

Status : Modified

Published: 2023-02-03T20:15:10.433

Modified: 2024-11-21T07:47:06.750

Link: CVE-2023-23925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.