Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-23343

Опубликовано: 04 мая 2021
Источник: redhat
CVSS3: 5.3

Описание

All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.

A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.

Отчет

In Red Had Quay , whilst a vulnerable version of path-parse is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low. In OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of 'path-parse'. Since the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix. This may be fixed in the future. In Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of path-parse, however the vulnerable functionality is currently not used in any part of the product. In Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of path-parse, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used. [1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 1kialiOut of support scope
OpenShift Service Mesh 1servicemesh-grafanaOut of support scope
OpenShift Service Mesh 1servicemesh-prometheusOut of support scope
OpenShift Service Mesh 2.0kialiFix deferred
OpenShift Service Mesh 2.0servicemesh-grafanaFix deferred
OpenShift Service Mesh 2.0servicemesh-prometheusFix deferred
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-api-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-header-rhel8Fix deferred
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-rhel8Fix deferred
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-ui-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1956818nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
около 4 лет назад

All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.

CVSS3: 5.3
github
почти 4 года назад

Regular Expression Denial of Service in path-parse

rocky
больше 3 лет назад

Important: nodejs:14 security and bug fix update

suse-cvrf
больше 3 лет назад

Security update for nodejs14

suse-cvrf
больше 3 лет назад

Security update for nodejs8

5.3 Medium

CVSS3