path-to-regexp 0.1.11
1 security vulnerability
found in version
0.1.11
path-to-regexp contains a ReDoS
high severity CVE-2024-52798
high severity
CVE-2024-52798
Affected versions:
< 0.1.12
Impact
The regular expression that is vulnerable to backtracking can be generated in versions before 0.1.12 of path-to-regexp
, originally reported in CVE-2024-45296
Patches
Upgrade to 0.1.12.
Workarounds
Avoid using two parameters within a single path segment, when the separator is not .
(e.g. no /:a-:b
). Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.
References
No license issues detected.
This package version has a license in the source code.
This package version is available.
This package version has not been yanked and is still available for usage.