Description
Affected versions of slug are vulnerable to a regular expression denial of service when parsing untrusted user input.
The issue is low severity, as it takes 50,000 characters to cause the event loop to block for 2 seconds,
About 50k characters can block the event loop for 2 seconds.
Recommendation
Update the slug package to the latest compatible version. Followings are version details:
- Affected version(s): <= 0.9.1
- Patched version(s): 0.9.2
References
Related Issues
- Regular Expression Denial of Service in timespan - CVE-2017-16115
- Regular Expression Denial of Service in tough-cookie - CVE-2017-15010
- Regular Expression Denial of Service in marked (GHSA-x5pg-88wf-qq4p) - CVE-2017-16114
- Regular Expression Denial of Service in debug - CVE-2017-16137
- Tags:
- npm
- slug
Anything's wrong? Let us know Last updated on January 12, 2023