Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-c2qf-rxjj-qqgw] semver vulnerable to Regular Expression Denial of Service #2615

Conversation

classicvalues
Copy link

Updates

  • Affected products
  • CVSS
  • Description

Comments
Complexity Issues (CWE-1226)

semver 7.5.4 is readily available and has been noted to work.
(Waiting on actions to submit reference and proof of viable debug, if security Dependabot becomes actionable patch again, I will take it as the patch did not work on CVE-2022-25883)

Reference:
https://cwe.mitre.org/data/definitions/1333.html

Member of:
Comprehensive Categorization: Resource Lifecycle Management (1416) as under for

Reference:
https://cwe.mitre.org/data/definitions/1416.html

under "Relationships" as where

is name="oc_1333_Relationships" under
further class="reltable" for under
name="oc_1333_699_relevant_table"

Fix:
package-lock.json on COMMIT via classicvalues/kill-repo
https://github.com/classicvalues/kill-repo/commit/b7e5a97fcd84426667ead424f2cfdb9d95efacdb
under test via Actions on debug when run second time. Will wait for confirmation to submit to all repos references in:
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw/dependabot
Though, has been submitted to NIST for update via email on softwaresafety.0@gmail.com

Reference is made in https://stackoverflow.com/questions/76538757/how-to-approach-and-fix-npm-security-issues-semver-vulnerable-to-regular-expre to fix being regularly available in 7.5.3 and

under nodemon's semver dependency "package-lock.json" reference file image.

More API work to be done, work is reference to MITRE, NIST: NVD, CNA:Snyk, @mrgrain, @G-Rath, and StackOverflow contributors by the names of:
https://stackoverflow.com/users/8958122/snehil-shah
https://stackoverflow.com/users/10652129/tost
https://stackoverflow.com/users/18740661/muhammad-usman

ADVISORY:
Under NIST, the statement made is forward that 7.5.2 is enough for a patch. Though, only references to 7.5.3 being patched and viable are made on the internet. Internal admission is needed. Stated as "Up to (excluding)
7.5.2" Though, all other patch information, including their site introduction, make 5.7.2 as patch. I have taken the liberty of moving the needle to 7.5.4 until further notice. Once Action approval and patch reference is made on Dependabot, then I will work on redoing the CVE categorization. Note though, that for now, they work. Will wait for proof of concept and reference to submit Bug Bounty in at all. Only reference to 7.5.3 is on referenced StackOverflow, though I do not have access to sha on any site and have not looking into playing with it on mobile shell I am working on this on, only one on me, would hate to kill it. Though, on cloud I was able to reference and note in COMMIT the usage of 7.5.4 and sha readily available for API usage that Google $ GitHub have been able to reference for me on semantic-release/error and thus my private repository classicvalues/error. Please email me at softwaresafety.0@gmail.com for more access and if there are any questions. NIST would be the authority of concern, last patch was made on 07/11/2023 as referenced in https://nvd.nist.gov/vuln/detail/CVE-2022-25883#VulnChangeHistorySection.
Hope Snyk Action is up in a little. Kudos.

Especially,
Laudate Corpus LLC
https://nvd.nist.gov/vuln/detail/CVE-2022-25883#range-9389144

@github-actions github-actions bot changed the base branch from main to classicvalues/advisory-improvement-2615 August 12, 2023 16:57
@G-Rath
Copy link

G-Rath commented Aug 12, 2023

This change is incorrect - the vulnerability was patched in 7.5.2, not 7.5.4.

@shelbyc
Copy link
Contributor

shelbyc commented Aug 14, 2023

👋 Hi @classicvalues, the fix for this issue was introduced in this commit for version 7.5.2, not 7.5.4. Thank you for your interest in the advisory database and have a good week.

@github-actions github-actions bot deleted the classicvalues-GHSA-c2qf-rxjj-qqgw branch August 14, 2023 17:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants