Unpatched `path-to-regexp` ReDoS in 0.1.x
Moderate severity
GitHub Reviewed
Published
Dec 5, 2024
in
pillarjs/path-to-regexp
•
Updated Dec 6, 2024
Description
Published to the GitHub Advisory Database
Dec 5, 2024
Reviewed
Dec 5, 2024
Published by the National Vulnerability Database
Dec 5, 2024
Last updated
Dec 6, 2024
Impact
The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of
path-to-regexp
, originally reported in CVE-2024-45296Patches
Upgrade to 0.1.12.
Workarounds
Avoid using two parameters within a single path segment, when the separator is not
.
(e.g. no/:a-:b
). Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.References
References