Skip to content

Commit 7ed3e11

Browse files
Merge pull request #5603 from github/goshop4eva-GHSA-rhx6-c78j-4q9w
2 parents 7b38c2c + 7394fce commit 7ed3e11

File tree

1 file changed

+3
-8
lines changed

1 file changed

+3
-8
lines changed

advisories/github-reviewed/2024/12/GHSA-rhx6-c78j-4q9w/GHSA-rhx6-c78j-4q9w.json

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,14 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rhx6-c78j-4q9w",
4-
"modified": "2025-01-24T21:41:07Z",
4+
"modified": "2025-01-24T21:41:09Z",
55
"published": "2024-12-05T22:40:47Z",
66
"aliases": [
77
"CVE-2024-52798"
88
],
99
"summary": "Unpatched `path-to-regexp` ReDoS in 0.1.x",
1010
"details": "### Impact\n\nThe regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of `path-to-regexp`, originally reported in CVE-2024-45296\n\n### Patches\n\nUpgrade to 0.1.12.\n\n### Workarounds\n\nAvoid using two parameters within a single path segment, when the separator is not `.` (e.g. no `/:a-:b`). Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.\n\n### References\n\n- https://github.com/advisories/GHSA-9wv6-86v2-598j\n- https://blakeembrey.com/posts/2024-09-web-redos/",
11-
"severity": [
12-
{
13-
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"
15-
}
16-
],
11+
"severity": [],
1712
"affected": [
1813
{
1914
"package": {
@@ -65,7 +60,7 @@
6560
"cwe_ids": [
6661
"CWE-1333"
6762
],
68-
"severity": "HIGH",
63+
"severity": "MODERATE",
6964
"github_reviewed": true,
7065
"github_reviewed_at": "2024-12-05T22:40:47Z",
7166
"nvd_published_at": "2024-12-05T23:15:06Z"

0 commit comments

Comments
 (0)