CVE-2023-43646

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-43646
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-43646.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-43646
Aliases
Downstream
Related
Published
2023-09-26T18:19:29Z
Modified
2025-10-21T19:32:58Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
Inefficient Regular Expression Complexity in get-func-name
Details

get-func-name is a module to retrieve a function's name securely and consistently both in NodeJS and the browser. Versions prior to 2.0.1 are subject to a regular expression denial of service (redos) vulnerability which may lead to a denial of service when parsing malicious input. This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input: '\t'.repeat(54773) + '\t/function/i'. This issue has been addressed in commit f934b228b which has been included in releases from 2.0.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-1333",
        "CWE-400"
    ]
}
References

Affected packages

Git / github.com/chaijs/get-func-name

Affected ranges

Type
GIT
Repo
https://github.com/chaijs/get-func-name
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed