Описание
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Отчет
In Red Had Quay , whilst a vulnerable version of path-parse
is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.
In OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of 'path-parse'.
Since the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.
This may be fixed in the future.
In Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of path-parse
, however the vulnerable functionality is currently not used in any part of the product.
In Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of path-parse
, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.
[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
OpenShift Service Mesh 1 | kiali | Out of support scope | ||
OpenShift Service Mesh 1 | servicemesh-grafana | Out of support scope | ||
OpenShift Service Mesh 1 | servicemesh-prometheus | Out of support scope | ||
OpenShift Service Mesh 2.0 | kiali | Fix deferred | ||
OpenShift Service Mesh 2.0 | servicemesh-grafana | Fix deferred | ||
OpenShift Service Mesh 2.0 | servicemesh-prometheus | Fix deferred | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/console-api-rhel8 | Not affected | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/console-header-rhel8 | Fix deferred | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/console-rhel8 | Fix deferred | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/console-ui-rhel8 | Fix deferred |
Показывать по
Дополнительная информация
Статус:
5.3 Medium
CVSS3
Связанные уязвимости
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Regular Expression Denial of Service in path-parse
5.3 Medium
CVSS3