This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/.?/)
{
"unresolved_ranges": [
{
"extracted_events": [
{
"fixed": "20.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "19c"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:enterprise_manager_express_user_interface:19c:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "21.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"fixed": "11.2.9.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"fixed": "19.1.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:spatial_studio:*:*:*:*:*:*:*:*"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "5.58.2"
}
],
"source": [
"CPE_FIELD",
"REFERENCES"
],
"cpe": "cpe:2.3:a:codemirror:codemirror:*:*:*:*:*:*:*:*"
}