CVE-2024-41818 – fast-xml-parser
Package
Manager: npm
Name: fast-xml-parser
Vulnerable Version: >=4.3.5 <4.4.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00472 pctl0.63729
Details
fast-xml-parser vulnerable to ReDOS at currency parsing ### Summary A ReDOS that exists on currency.js was discovered by Gauss Security Labs R&D team. ### Details https://github.com/NaturalIntelligence/fast-xml-parser/blob/v4.4.0/src/v5/valueParsers/currency.js#L10 contains a vulnerable regex ### PoC pass the following string '\t'.repeat(13337) + '.' ### Impact Denial of service during currency parsing in experimental version 5 of fast-xml-parser-library https://gauss-security.com
Metadata
Created: 2024-07-29T17:46:16Z
Modified: 2024-10-11T14:13:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-mpg4-rc92-vx8v/GHSA-mpg4-rc92-vx8v.json
CWE IDs: ["CWE-1333", "CWE-400"]
Alternative ID: GHSA-mpg4-rc92-vx8v
Finding: F211
Auto approve: 1