Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Inefficient Regular Expression Complexity vulnerability with High severity found #249

Closed
babradshaw opened this issue Mar 12, 2024 · 6 comments · May be fixed by snykerjames-projects/vuln-app#12

Comments

@babradshaw
Copy link

Being flagged as vulnerable package:

Dependency npm:micromatch:4.0.5 is vulnerable
Cxca84a1c2-1f12 7.5 Inefficient Regular Expression Complexity vulnerability with High severity found
Results powered by Checkmarx(c)

@RobinGiel
Copy link

@babradshaw this pull request should fix it. Hopefully the maintainers can merge this asap

@rmn183
Copy link

rmn183 commented Apr 2, 2024

@babradshaw any update on the above micromatch:4.0.5 ?

@ncmajith
Copy link

any updates on the above ? new release ?

@MarioTeixeiraCx
Copy link

Hi @jonschlinkert,

We have followed all the guidelines for responsible disclosure. We remind you that we didn't get a direct response from you.

We have tested the latest micromatch version, 4.0.7, and the ReDoS vulnerability – CVE-2024-4067 – still exists. Our PoC showed the program will hang for longer as the size of the input increases, which can cause Denial of Service. Therefore, updating braces (92d490d) won't solve this vulnerability.

We understand your concerns, and it's a far-fetched situation to encounter the vulnerability in a dependency, but as reported in our email, it's still possible. We maintain our position that it's a valid vulnerability. However, we considered that the score was initially too high for the real impact it can have, so we have recalculated its severity accordingly.

Regarding CVE-2024-4068, we confirm it was fixed in braces version 3.0.3.

Best regards,
Mário Teixeira

@paulmillr
Copy link
Member

paulmillr commented May 22, 2024

@MarioTeixeiraCx send me an email with vuln. I have repo and npm access

@MarioTeixeiraCx
Copy link

Thank you, @paulmillr. I have forwarded the email thread.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

6 participants