Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-25285

Опубликовано: 14 фев. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

@octokit/endpoint turns REST API endpoints into generic request options. Starting in version 4.1.0 and prior to version 10.1.3, by crafting specific options parameters, the endpoint.parse(options) call can be triggered, leading to a regular expression denial-of-service (ReDoS) attack. This causes the program to hang and results in high CPU utilization. The issue occurs in the parse function within the parse.ts file of the npm package @octokit/endpoint. Version 10.1.3 contains a patch for the issue.

A flaw was found in the octokit/endpoint package for Node.js. In affected versions, the endpoint.parse(options) call can be triggered via specially-crafted options parameters, leading to a regular expression denial-of-service (ReDoS) attack. This causes the program to hang and results in high CPU utilization. The issue occurs in the parse function within the parse.ts file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Will not fix
OpenShift Serverlessopenshift-serverless-1/kn-backstage-plugins-eventmesh-rhel8Affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-rhel8Will not fix
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Fix deferred
Red Hat Integration Camel K 1io.apicurio-apicurio-registryWill not fix
Red Hat JBoss Enterprise Application Platform 8org.keycloak-keycloak-parentWill not fix
Red Hat JBoss Enterprise Application Platform Expansion Packorg.keycloak-keycloak-parentWill not fix
Red Hat OpenShift Container Platform 4openshift4/ose-consoleWill not fix
Red Hat OpenShift Dev Spacesdevspaces/code-rhel8Will not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2345820octokit/endpoint: @octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking

EPSS

Процентиль: 30%
0.0011
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
7 месяцев назад

@octokit/endpoint turns REST API endpoints into generic request options. Starting in version 4.1.0 and prior to version 10.1.3, by crafting specific `options` parameters, the `endpoint.parse(options)` call can be triggered, leading to a regular expression denial-of-service (ReDoS) attack. This causes the program to hang and results in high CPU utilization. The issue occurs in the `parse` function within the `parse.ts` file of the npm package `@octokit/endpoint`. Version 10.1.3 contains a patch for the issue.

CVSS3: 5.3
github
7 месяцев назад

@octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking

EPSS

Процентиль: 30%
0.0011
Низкий

5.3 Medium

CVSS3