All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
References
Link | Resource |
---|---|
https://github.com/jbgutierrez/path-parse/issues/8 | Exploit Issue Tracking Third Party Advisory |
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85%40%3Cdev.myfaces.apache.org%3E | |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-05-04 09:15
Updated : 2023-11-07 03:30
NVD link : CVE-2021-23343
Mitre link : CVE-2021-23343
CVE.ORG link : CVE-2021-23343
JSON object : View
Products Affected
path-parse_project
- path-parse
CWE