-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2024-4068 (High) detected in braces-3.0.2.tgz #1838
Comments
Vuln doesn't really affect us, citing paulmillr/chokidar#1314 -- theoretically, the call chain is via |
For fun I tried to do it anyways: import subprocess
subprocess.run(["yarn", "run", "mocha", "--watch_files", "{"*200_000_000]) But got
Turns out there's an OS limit on the maximum length of CLI arguments, which you can find with getconf. This limit cannot be changed.
So, doesn't affect us, but educational nonetheless. :) |
CVE-2024-4068 - High Severity Vulnerability
Vulnerable Library - braces-3.0.2.tgz
Bash-like brace expansion, implemented in JavaScript. Safer than other brace expansion libs, with complete support for the Bash 4.3 braces specification, without sacrificing speed.
Library home page: https://registry.npmjs.org/braces/-/braces-3.0.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
Found in HEAD commit: 7a517c9fb93418ac1502fd437a58e6294370125c
Found in base branch: main
Vulnerability Details
The NPM package
braces
fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. Inlib/parse.js,
if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.Publish Date: 2024-05-14
URL: CVE-2024-4068
CVSS 3 Score Details (7.5)
Base Score Metrics:
The text was updated successfully, but these errors were encountered: