All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
References
| Link | Resource |
|---|---|
| https://github.com/jbgutierrez/path-parse/issues/8 | Exploit Issue Tracking Third Party Advisory |
| https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067 | Exploit Third Party Advisory |
| https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028 | Exploit Third Party Advisory |
| https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E | Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-05-04 02:15
Updated : 2021-12-03 11:59
NVD link : CVE-2021-23343
Mitre link : CVE-2021-23343
JSON object : View
CWE
Products Affected
path-parse_project
- path-parse


