Description
The csv-parse module before 4.4.6 for Node.js is vulnerable to Regular Expression Denial of Service. The __isInt() function contains a malformed regular expression that processes large crafted input very slowly. This is triggered when using the cast option.
Remediation
References
https://www.npmjs.com/advisories/1171
https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a
https://security.netapp.com/advisory/ntap-20191127-0002/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
Related Vulnerabilities
CVE-2020-15138 Vulnerability in maven package org.webjars.npm:prismjs
CVE-2021-45456 Vulnerability in maven package org.apache.kylin:kylin-server-base
CVE-2020-28496 Vulnerability in npm package three
CVE-2018-16330 Vulnerability in maven package org.webjars.npm:editor.md
CVE-2020-7766 Vulnerability in maven package org.webjars.npm:json-ptr