GHSA-3rfm-jhwj-7488

Suggest an improvement
Source
https://github.com/advisories/GHSA-3rfm-jhwj-7488
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-3rfm-jhwj-7488/GHSA-3rfm-jhwj-7488.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3rfm-jhwj-7488
Aliases
Published
2022-10-14T19:00:38Z
Modified
2023-11-01T04:59:39.994592Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable
Details

A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional amount of time to process. This issue has been patched in versions 1.4.2, 2.0.4 and 3.2.1.

References

Affected packages

npm / loader-utils

Package

Affected ranges

Type
SEMVER
Events
Introduced
1.0.0
Fixed
1.4.2

Ecosystem specific

{
    "affected_functions": [
        "(loader-utils).interpolateName"
    ]
}

npm / loader-utils

Package

Affected ranges

Type
SEMVER
Events
Introduced
2.0.0
Fixed
2.0.4

Ecosystem specific

{
    "affected_functions": [
        "(loader-utils).interpolateName"
    ]
}

npm / loader-utils

Package

Affected ranges

Type
SEMVER
Events
Introduced
3.0.0
Fixed
3.2.1

Ecosystem specific

{
    "affected_functions": [
        "(loader-utils).interpolateName"
    ]
}