CVE-2021-43843

jsx-slack is a package for building JSON objects for Slack block kit surfaces from JSX. The maintainers found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient tfor protection from a Regular Expression Denial of Service (ReDoS) attack. If an attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte characters_, an internal regular expression for escaping characters may consume an excessive amount of computing resources. v4.5.1 passes the test against ASCII characters but misses the case of multibyte characters. jsx-slack v4.5.2 has updated regular expressions for escaping blockquote characters to prevent catastrophic backtracking. It is also including an updated test case to confirm rendering multiple tags in `<blockquote>` with multibyte characters.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jsx-slack_project:jsx-slack:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 5.3
References () https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc - Patch, Third Party Advisory () https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc - Patch, Third Party Advisory
References () https://github.com/yhatt/jsx-slack/releases/tag/v4.5.2 - Release Notes, Third Party Advisory () https://github.com/yhatt/jsx-slack/releases/tag/v4.5.2 - Release Notes, Third Party Advisory
References () https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q - Exploit, Patch, Third Party Advisory () https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q - Exploit, Patch, Third Party Advisory
References () https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6 - Exploit, Patch, Third Party Advisory () https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6 - Exploit, Patch, Third Party Advisory

Information

Published : 2021-12-20 22:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43843

Mitre link : CVE-2021-43843

CVE.ORG link : CVE-2021-43843


JSON object : View

Products Affected

jsx-slack_project

  • jsx-slack
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1333

Inefficient Regular Expression Complexity

NVD-CWE-Other