[GHSA-c2qf-rxjj-qqgw] semver vulnerable to Regular Expression Denial of Service #2615
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Updates
Comments
Complexity Issues (CWE-1226)
semver 7.5.4 is readily available and has been noted to work.
(Waiting on actions to submit reference and proof of viable debug, if security Dependabot becomes actionable patch again, I will take it as the patch did not work on CVE-2022-25883)
Reference:
https://cwe.mitre.org/data/definitions/1333.html
Member of:
Comprehensive Categorization: Resource Lifecycle Management (1416) as under for
Reference:
https://cwe.mitre.org/data/definitions/1416.html
under "Relationships" as where
Fix:
package-lock.json on COMMIT via classicvalues/kill-repo
https://github.com/classicvalues/kill-repo/commit/b7e5a97fcd84426667ead424f2cfdb9d95efacdb
under test via Actions on debug when run second time. Will wait for confirmation to submit to all repos references in:
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw/dependabot
Though, has been submitted to NIST for update via email on softwaresafety.0@gmail.com
Reference is made in https://stackoverflow.com/questions/76538757/how-to-approach-and-fix-npm-security-issues-semver-vulnerable-to-regular-expre to fix being regularly available in 7.5.3 and
More API work to be done, work is reference to MITRE, NIST: NVD, CNA:Snyk, @mrgrain, @G-Rath, and StackOverflow contributors by the names of:
https://stackoverflow.com/users/8958122/snehil-shah
https://stackoverflow.com/users/10652129/tost
https://stackoverflow.com/users/18740661/muhammad-usman
ADVISORY:
Under NIST, the statement made is forward that 7.5.2 is enough for a patch. Though, only references to 7.5.3 being patched and viable are made on the internet. Internal admission is needed. Stated as "Up to (excluding)
7.5.2" Though, all other patch information, including their site introduction, make 5.7.2 as patch. I have taken the liberty of moving the needle to 7.5.4 until further notice. Once Action approval and patch reference is made on Dependabot, then I will work on redoing the CVE categorization. Note though, that for now, they work. Will wait for proof of concept and reference to submit Bug Bounty in at all. Only reference to 7.5.3 is on referenced StackOverflow, though I do not have access to sha on any site and have not looking into playing with it on mobile shell I am working on this on, only one on me, would hate to kill it. Though, on cloud I was able to reference and note in COMMIT the usage of 7.5.4 and sha readily available for API usage that Google $ GitHub have been able to reference for me on semantic-release/error and thus my private repository classicvalues/error. Please email me at softwaresafety.0@gmail.com for more access and if there are any questions. NIST would be the authority of concern, last patch was made on 07/11/2023 as referenced in https://nvd.nist.gov/vuln/detail/CVE-2022-25883#VulnChangeHistorySection.
Hope Snyk Action is up in a little. Kudos.
Especially,
Laudate Corpus LLC
https://nvd.nist.gov/vuln/detail/CVE-2022-25883#range-9389144