You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: t-vault/tvaultui/package.json
Path to vulnerable library: t-vault/tvaultui/node_modules/braces/package.json
Dependency Hierarchy:
http-proxy-middleware-0.9.1.tgz (Root Library)
micromatch-2.3.11.tgz
❌ braces-1.8.5.tgz (Vulnerable Library)
braces-0.1.5.tgz
Fastest brace expansion lib. Typically used with file paths, but can be used with any string. Expands comma-separated values (e.g. `foo/{a,b,c}/bar`) and alphabetical or numerical ranges (e.g. `{1..9}`)
Path to dependency file: t-vault/tvaultui/package.json
Path to vulnerable library: t-vault/tvaultui/node_modules/expand-braces/node_modules/braces/package.json
Dependency Hierarchy:
karma-0.13.22.tgz (Root Library)
expand-braces-0.1.2.tgz
❌ braces-0.1.5.tgz (Vulnerable Library)
Vulnerability Details
Braces before 1.4.2 and 2.17.2 is vulnerable to ReDoS. It used a regular expression (^{(,+(?:({,+})),|,(?:({,+})),+)}) in order to detects empty braces. This can cause an impact of about 10 seconds matching time for data 50K characters long.
CVE-2018-1109 - High Severity Vulnerability
Vulnerable Libraries - braces-1.8.5.tgz, braces-0.1.5.tgz
braces-1.8.5.tgz
Fastest brace expansion for node.js, with the most complete support for the Bash 4.3 braces specification.
Library home page: https://registry.npmjs.org/braces/-/braces-1.8.5.tgz
Path to dependency file: t-vault/tvaultui/package.json
Path to vulnerable library: t-vault/tvaultui/node_modules/braces/package.json
Dependency Hierarchy:
braces-0.1.5.tgz
Fastest brace expansion lib. Typically used with file paths, but can be used with any string. Expands comma-separated values (e.g. `foo/{a,b,c}/bar`) and alphabetical or numerical ranges (e.g. `{1..9}`)
Library home page: https://registry.npmjs.org/braces/-/braces-0.1.5.tgz
Path to dependency file: t-vault/tvaultui/package.json
Path to vulnerable library: t-vault/tvaultui/node_modules/expand-braces/node_modules/braces/package.json
Dependency Hierarchy:
Vulnerability Details
Braces before 1.4.2 and 2.17.2 is vulnerable to ReDoS. It used a regular expression (^{(,+(?:({,+})),|,(?:({,+})),+)}) in order to detects empty braces. This can cause an impact of about 10 seconds matching time for data 50K characters long.
Publish Date: 2020-07-21
URL: CVE-2018-1109
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1547272
Release Date: 2020-07-21
Fix Resolution: 2.3.1
The text was updated successfully, but these errors were encountered: