Описание
es5-ext vulnerable to Regular Expression Denial of Service in function#copy
and function#toStringTokens
Impact
Passing functions with very long names or complex default argument names into function#copy
orfunction#toStringTokens
may put script to stall
Patches
Fixed with https://github.com/medikoo/es5-ext/commit/3551cdd7b2db08b1632841f819d008757d28e8e2 and https://github.com/medikoo/es5-ext/commit/a52e95736690ad1d465ebcd9791d54570e294602 Published with v0.10.63
Workarounds
No real workaround aside of refraining from using above utilities.
References
Ссылки
- https://github.com/medikoo/es5-ext/security/advisories/GHSA-4gmj-3p3h-gm8h
- https://nvd.nist.gov/vuln/detail/CVE-2024-27088
- https://github.com/medikoo/es5-ext/issues/201
- https://github.com/medikoo/es5-ext/commit/3551cdd7b2db08b1632841f819d008757d28e8e2
- https://github.com/medikoo/es5-ext/commit/a52e95736690ad1d465ebcd9791d54570e294602
Пакеты
es5-ext
>= 0.10.0, < 0.10.63
0.10.63
Связанные уязвимости
es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63.
es5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63.
es5-ext contains ECMAScript 5 extensions. Passing functions with very ...
Уязвимость функций function#copy и function#toStringTokens расширения ECMAScript 5 пакета es5-ext, позволяющая нарушителю вызвать отказ в обслуживании