Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXF2amMtZzV2ci1tZmdy
Regular Expression Denial of Service in papaparse
Versions of papaparse
prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The parse
function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
Recommendation
Upgrade to version 5.2.0 or later.
Permalink: https://github.com/advisories/GHSA-qvjc-g5vr-mfgrJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXF2amMtZzV2ci1tZmdy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 3 years ago
Updated: 9 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-qvjc-g5vr-mfgr
References:
- https://github.com/mholt/PapaParse/issues/777
- https://snyk.io/vuln/SNYK-JS-PAPAPARSE-564258
- https://www.npmjs.com/advisories/1515
- https://github.com/advisories/GHSA-qvjc-g5vr-mfgr
Affected Packages
npm:papaparse
Versions: < 5.2.0Fixed in: 5.2.0