Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cross-spawn
Cross-spawn cross-spawn |
|
CPEs | cpe:2.3:a:cross-spawn:cross-spawn:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cross-spawn
Cross-spawn cross-spawn |
|
Metrics |
ssvc
|
Fri, 08 Nov 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string. | |
Weaknesses | CWE-1333 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: snyk
Published: 2024-11-08T05:00:04.695Z
Updated: 2024-11-08T14:57:02.188Z
Reserved: 2023-12-22T12:33:20.123Z
Link: CVE-2024-21538
Vulnrichment
Updated: 2024-11-08T14:56:53.940Z
NVD
Status : Awaiting Analysis
Published: 2024-11-08T05:15:06.453
Modified: 2024-11-08T19:01:03.880
Link: CVE-2024-21538
Redhat
No data.