Lucene search

K
githubGitHub Advisory DatabaseGHSA-3RFM-JHWJ-7488
HistoryOct 14, 2022 - 7:00 p.m.

loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable

2022-10-1419:00:38
CWE-1333
GitHub Advisory Database
github.com
35
loader-utils
redos
vulnerability
patched
interpolatename
webpack

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.007 Low

EPSS

Percentile

80.3%

A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional amount of time to process. This issue has been patched in versions 1.4.2, 2.0.4 and 3.2.1.

Affected configurations

Vulners
Node
loaderutilsRange<3.2.1
OR
loaderutilsRange<2.0.4
OR
loaderutilsRange<1.4.2

References

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.007 Low

EPSS

Percentile

80.3%