Description
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Remediation
References
https://github.com/jbgutierrez/path-parse/issues/8
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85%40%3Cdev.myfaces.apache.org%3E
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
Related Vulnerabilities
CVE-2023-36472 Vulnerability in npm package @strapi/utils
CVE-2017-16226 Vulnerability in npm package static-eval
CVE-2020-7780 Vulnerability in maven package com.softwaremill.akka-http-session:core_2.12
CVE-2022-25296 Vulnerability in npm package bodymen
CVE-2016-10735 Vulnerability in maven package ua.mobius.media:bootstrap