You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
CVE-2018-1107 - Medium Severity Vulnerability
Vulnerable Library - is-my-json-valid-2.16.1.tgz
A JSONSchema validator that uses code generation to be extremely fast
Library home page: https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.16.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/is-my-json-valid/package.json
Dependency Hierarchy:
Found in HEAD commit: b903c70353372d39521184ee20a1cc8a3fb7df48
Found in base branch: master
Vulnerability Details
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
Publish Date: 2021-03-30
URL: CVE-2018-1107
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-4hpf-3wq7-5rpr
Release Date: 2021-03-30
Fix Resolution: is-my-json-valid - 1.4.1, 2.17.2
The text was updated successfully, but these errors were encountered: