The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
References
Link | Resource |
---|---|
https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a | Patch Third Party Advisory |
https://snyk.io/vuln/npm:bson:20180225 | Exploit Technical Description Third Party Advisory |
https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a | Patch Third Party Advisory |
https://snyk.io/vuln/npm:bson:20180225 | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 03:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/npm:bson:20180225 - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2018-07-10 20:29
Updated : 2024-11-21 03:48
NVD link : CVE-2018-13863
Mitre link : CVE-2018-13863
CVE.ORG link : CVE-2018-13863
JSON object : View
Products Affected
mongodb
- js-bson
CWE