Vulnerabilities > CVE-2021-23343 - Unspecified vulnerability in Path-Parse Project Path-Parse
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
References
- https://github.com/jbgutierrez/path-parse/issues/8
- https://github.com/jbgutierrez/path-parse/issues/8
- https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85%40%3Cdev.myfaces.apache.org%3E
- https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85%40%3Cdev.myfaces.apache.org%3E
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
- https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
- https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067