Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2026-01715

Опубликовано: 11 июн. 2025
Источник: fstec
CVSS3: 3.1
CVSS2: 2.1
EPSS Низкий

Описание

Уязвимость функции expand() библиотеки juliangruber/brace-expansion программной платформы Node.js связана с неконтролируемым расходом ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании

Вендор

Node.js Foundation
Сообщество свободного программного обеспечения

Наименование ПО

Node.js
brace-expansion

Версия ПО

20.20.0 (Node.js)
до 1.1.11 включительно (brace-expansion)
до 2.0.1 включительно (brace-expansion)
до 3.0.0 включительно (brace-expansion)
до 4.0.0 включительно (brace-expansion)

Тип ПО

Сетевое программное средство
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Низкий уровень опасности (базовая оценка CVSS 2.0 составляет 2,1)
Низкий уровень опасности (базовая оценка CVSS 3.1 составляет 3,1)
Низкий уровень опасности (оценка CVSS 4.0 составляет 1,3)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://github.com/juliangruber/brace-expansion/releases/tag/v4.0.1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 9%
0.0003
Низкий

3.1 Low

CVSS3

2.1 Low

CVSS2

Связанные уязвимости

CVSS3: 3.1
ubuntu
10 месяцев назад

A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to upgrade the affected component.

CVSS3: 3.1
redhat
10 месяцев назад

A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to upgrade the affected component.

CVSS3: 3.1
nvd
10 месяцев назад

A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to upgrade the affected component.

CVSS3: 3.1
msrc
7 месяцев назад

juliangruber brace-expansion index.js expand redos

CVSS3: 3.1
debian
10 месяцев назад

A vulnerability was found in juliangruber brace-expansion up to 1.1.11 ...

EPSS

Процентиль: 9%
0.0003
Низкий

3.1 Low

CVSS3

2.1 Low

CVSS2