Description
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Remediation
References
https://github.com/jbgutierrez/path-parse/issues/8
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85%40%3Cdev.myfaces.apache.org%3E
Related Vulnerabilities
CVE-2022-24822 Vulnerability in npm package @podium/proxy
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-jms-processors
CVE-2022-48285 Vulnerability in maven package org.webjars.npm:github-com-stuk-jszip
CVE-2020-8141 Vulnerability in maven package org.webjars.npm:dot
CVE-2023-26486 Vulnerability in maven package org.webjars.bowergithub.vega:vega