Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

CVE-2024-52798 (High) detected in path-to-regexp-0.1.10.tgz #224

Open
mend-bolt-for-github bot opened this issue Dec 6, 2024 · 0 comments
Open

CVE-2024-52798 (High) detected in path-to-regexp-0.1.10.tgz #224

mend-bolt-for-github bot opened this issue Dec 6, 2024 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link
Contributor

mend-bolt-for-github bot commented Dec 6, 2024

CVE-2024-52798 - High Severity Vulnerability

Vulnerable Library - path-to-regexp-0.1.10.tgz

Express style path to RegExp utility

Library home page: https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-0.1.10.tgz

Path to dependency file: /ui/package.json

Path to vulnerable library: /ui/package.json

Dependency Hierarchy:

  • @postgres.ai/ce-1.0.0.tgz (Root Library)
    • react-scripts-5.0.1.tgz
      • webpack-dev-server-4.11.0.tgz
        • express-4.21.0.tgz
          • path-to-regexp-0.1.10.tgz (Vulnerable Library)

Found in base branch: master

Vulnerability Details

path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of path-to-regexp. Upgrade to 0.1.12. This vulnerability exists because of an incomplete fix for CVE-2024-45296.

Publish Date: 2024-12-05

URL: CVE-2024-52798

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-rhx6-c78j-4q9w

Release Date: 2024-12-05

Fix Resolution: path-to-regexp - 0.1.12


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Dec 6, 2024
@mend-bolt-for-github mend-bolt-for-github bot changed the title CVE-2024-52798 (Medium) detected in path-to-regexp-0.1.10.tgz CVE-2024-52798 (High) detected in path-to-regexp-0.1.10.tgz Dec 9, 2024
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Development

No branches or pull requests

0 participants