Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix CVE–2021–3807 #23

Conversation

debricked-staging[bot]
Copy link

CVE–2021–3807

Vulnerable dependency:     ansi-regex (npm)    3.0.0    4.1.0

Vulnerability details

Description

Incorrect Comparison

The software compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.

NVD

ansi-regex is vulnerable to Inefficient Regular Expression Complexity

GitHub

Inefficient Regular Expression Complexity in chalk/ansi-regex

ansi-regex is vulnerable to Inefficient Regular Expression Complexity which could lead to a denial of service.

CVSS details - 7.5

 

CVSS3 metrics
Attack Vector Network
Attack Complexity Low
Privileges Required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity None
Availability High
References

    Inefficient Regular Expression Complexity in chalk/ansi-regex · CVE-2021-3807 · GitHub Advisory Database · GitHub
    NVD - CVE-2021-3807
    Fix potential ReDoS (#37) · chalk/ansi-regex@8d1d7cd · GitHub
    Inefficient Regular Expression Complexity vulnerability found in ansi-regex
    Regular Expression Denial of Service (ReDoS) in ansi-regex | CVE-2021-3807 | Snyk
    Backport of security patch, for benefit of yargs · Issue #38 · chalk/ansi-regex · GitHub
    Backport of security patch, for benefit of yargs · Issue #38 · chalk/ansi-regex · GitHub
    ansi-regex/index.js at c1b5e45f7c65a332ffb03ac8e5804ad37c579cdc · chalk/ansi-regex · GitHub
    GitHub - chalk/ansi-regex: Regular expression for matching ANSI escape codes
    Comparing chalk:HEAD...yetingli:main · chalk/ansi-regex · GitHub
    Release v6.0.1 · chalk/ansi-regex · GitHub
    Oracle Critical Patch Update Advisory - April 2022

 

Related information

📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more about the CVE

 

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
0 participants