GHSA-6g33-8w2q-4hxv

Suggest an improvement
Source
https://github.com/advisories/GHSA-6g33-8w2q-4hxv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-6g33-8w2q-4hxv/GHSA-6g33-8w2q-4hxv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6g33-8w2q-4hxv
Aliases
Published
2023-01-05T12:30:27Z
Modified
2023-11-08T04:07:08.423714Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
robots-txt-guard Inefficient Regular Expression Complexity vulnerability
Details

A vulnerability was found in Woorank robots-txt-guard. It has been rated as problematic. Affected by this issue is the function makePathPattern of the file lib/patterns.js. The manipulation of the argument pattern leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The name of the patch is c03827cd2f9933619c23894ce7c98401ea824020. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217448.

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-1333"
    ],
    "severity": "HIGH",
    "github_reviewed_at": "2023-01-09T20:04:05Z",
    "nvd_published_at": "2023-01-05T11:15:00Z"
}
References

Affected packages

npm / robots-txt-guard

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2