In JetBrains YouTrack before 2024.3.52635 potential ReDoS was possible due to vulnerable RegExp in Ruby syntax detector
Advisories
Source ID Title
EUVD EUVD EUVD-2024-52321 In JetBrains YouTrack before 2024.3.52635 potential ReDoS was possible due to vulnerable RegExp in Ruby syntax detector
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 30 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Jetbrains
Jetbrains youtrack
CPEs cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*
Vendors & Products Jetbrains
Jetbrains youtrack

Wed, 04 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 11:30:00 +0000

Type Values Removed Values Added
Description In JetBrains YouTrack before 2024.3.52635 potential ReDoS was possible due to vulnerable RegExp in Ruby syntax detector
Weaknesses CWE-1333
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: JetBrains

Published:

Updated: 2024-12-04T14:09:10.737Z

Reserved: 2024-11-29T19:00:19.889Z

Link: CVE-2024-54157

cve-icon Vulnrichment

Updated: 2024-12-04T14:04:47.819Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-04T12:15:20.473

Modified: 2025-01-30T21:47:10.683

Link: CVE-2024-54157

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.