CVE-2023-34104 – fast-xml-parser
Package
Manager: npm
Name: fast-xml-parser
Vulnerable Version: >=4.1.3 <4.2.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00196 pctl0.41759
Details
fast-xml-parser vulnerable to Regex Injection via Doctype Entities ### Impact "fast-xml-parser" allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. ### Patches The problem has been resolved in v4.2.4 ### Workarounds Avoid using DOCTYPE parsing by `processEntities: false` option.
Metadata
Created: 2023-06-06T17:33:13Z
Modified: 2024-01-25T21:05:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-6w63-h3fj-q4vw/GHSA-6w63-h3fj-q4vw.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-6w63-h3fj-q4vw
Finding: F211
Auto approve: 1