-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Async 3.2.5 is vulnerable to ReDoS (Regular Expression Denial of Service) CVE-2024-39249 #1975
Comments
This seems incredibly unlikely to be exploitable, except in development. If a user of Async was eval()ing user input and passing functions to |
No, this is not exploitable except with extremely contrived examples. |
@aearly, if you think so, can you please look & verify why Snyk is mentioning it as a medium severity vulnerability. If possible kindly provide a new patch version of it, as current version 3.2.5 is causing a Medium CVE which is leading to failure of npm vulnerability scan in our build pipeline |
@aearly , Just for your reference, please once go through an observation explained by this author |
@PPKath-1611: I agree with @aearly's comment in full. Please don't nag the the maintainers; false-positive CVEs are a nuisance for everyone. I've raised a retraction request in the GitHub repository & am contacting NVD asking them to do the same. https://github.com/zunak/CVE-2024-39249/issues/1 If you have a problem with Snyk assessing the 'vulnerability' as medium affecting your builds, contact Snyk, not this maintainer. |
Yes, thanks for the backup. For reference everyone, the example code provided involved 500 spaces beween |
Snyk appears to have revoked this vulnerability. |
Okay, closing this issue. I'm also disappointed that Snyk cried wolf on a completely unverified CVE and created a lot of extra work for you all. |
Please assess and address the CVE-2024-39249 in Async 3.2.5
CVE-2024-39249 - Medium Severity Vulnerability
Vulnerable Library - async-3.2.5.tgz
Library home page: https://registry.npmjs.org/async/-/async-3.2.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Async <= 2.6.4 and <= 3.2.5 are vulnerable to ReDoS (Regular Expression Denial of Service) while parsing function in autoinject function.
Publish Date: 2024-07-01
URL: CVE-2024-39249
CVSS 3 Score Details (5.5)
Base Score Metrics:
The text was updated successfully, but these errors were encountered: