漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
path-to-regexp vulnerable to Denial of Service via sequential optional groups
Vulnerability Description
Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service. Patches: Fixed in version 8.4.0. Workarounds: Limit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
Path-to-RegExp 安全漏洞
Vulnerability Description
Path-to-RegExp是pillarjs开源的一个工具。用于将路径字符串转换为正则表达式。 Path-to-RegExp 8.4.0之前版本存在安全漏洞,该漏洞源于生成的正则表达式存在指数级增长问题,可能导致拒绝服务攻击。
CVSS Information
N/A
Vulnerability Type
N/A