Today > | 9 High | 16 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-52798

Dec. 5, 2024, 11:15 p.m.

Product(s) Impacted

path-to-regexp

  • 0.1.12

Description

path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of path-to-regexp. Upgrade to 0.1.12. This vulnerability exists because of an incomplete fix for CVE-2024-45296.

Weaknesses

CWE-1333
Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

CWE ID: 1333

Date

Published: Dec. 5, 2024, 11:15 p.m.

Last Modified: Dec. 5, 2024, 11:15 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security-advisories@github.com

References

https://github.com/ security-advisories@github.com

https://github.com/ security-advisories@github.com