CVE-2020-7760

This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*
Configurations

Configuration 1 (hide)

cpe:2.3:a:codemirror:codemirror:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_express_user_interface:19c:*:*:*:*:*:*:*
cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:spatial_studio:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-10-30 11:15

Updated : 2024-02-28 18:08


NVD link : CVE-2020-7760

Mitre link : CVE-2020-7760

CVE.ORG link : CVE-2020-7760


JSON object : View

Products Affected

oracle

  • essbase
  • hyperion_data_relationship_management
  • enterprise_manager_express_user_interface
  • application_express
  • spatial_studio

codemirror

  • codemirror
CWE
CWE-400

Uncontrolled Resource Consumption