The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions.
References
Link | Resource |
---|---|
https://github.com/terser/terser/blob/master/lib/compress/evaluate.js%23L135 | Broken Link |
https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b | Patch Third Party Advisory |
https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-TERSER-2806366 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1333 |
Information
Published : 2022-07-15 20:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-25858
Mitre link : CVE-2022-25858
CVE.ORG link : CVE-2022-25858
JSON object : View
Products Affected
terser
- terser
CWE
CWE-1333
Inefficient Regular Expression Complexity