CVE-2024-41655

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41655
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41655.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41655
Aliases
Related
Published
2024-07-23T15:15:05Z
Modified
2025-01-08T16:16:17.926536Z
Summary
[none]
Details

TF2 Item Format helps users format TF2 items to the community standards. Versions of tf2-item-format since at least 4.2.6 and prior to 5.9.14 are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input. This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any tf2-item-format to parse user input. Version 5.9.14 contains a fix for the issue.

References

Affected packages

Git / github.com/danocmx/node-tf2-item-format

Affected ranges

Type
GIT
Repo
https://github.com/danocmx/node-tf2-item-format
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v1.*

v1.0.0-beta.1

v4.*

v4.1.3-beta.0
v4.1.3-beta.1
v4.1.3-beta.2
v4.1.3-beta.3
v4.1.3-beta.4
v4.1.3-beta.5
v4.1.3-beta.6
v4.2.0
v4.2.1
v4.2.2
v4.2.3
v4.2.4
v4.2.5
v4.2.6
v4.3.0
v4.3.1
v4.3.2
v4.3.3
v4.3.4
v4.3.5

v5.*

v5.0.0
v5.3.1
v5.3.2
v5.4.0
v5.4.1
v5.4.2
v5.4.3
v5.5.0
v5.5.1
v5.5.2
v5.6.0
v5.6.1
v5.6.10
v5.6.11
v5.6.12
v5.6.13
v5.6.14
v5.6.15
v5.6.16
v5.6.17
v5.6.2
v5.6.3
v5.6.4
v5.6.5
v5.6.6
v5.6.7
v5.6.8
v5.7.0
v5.8.0
v5.8.1
v5.8.10
v5.8.2
v5.8.3
v5.8.4
v5.8.5
v5.8.6
v5.8.7
v5.8.8
v5.8.9
v5.9.0
v5.9.1
v5.9.10
v5.9.11
v5.9.12
v5.9.13
v5.9.2
v5.9.3
v5.9.4
v5.9.5
v5.9.6
v5.9.7
v5.9.8
v5.9.9