Description
Affected versions of slug are vulnerable to a regular expression denial of service when parsing untrusted user input.
The issue is low severity, as it takes 50,000 characters to cause the event loop to block for 2 seconds,
About 50k characters can block the event loop for 2 seconds.
Recommendation
Update the slug package to the latest compatible version. Followings are version details:
- Affected version(s): <= 0.9.1
- Patched version(s): 0.9.2
References
Related Issues
- Regular Expression Denial of Service in debug - CVE-2017-16137
- Regular Expression Denial of Service in marked (GHSA-x5pg-88wf-qq4p) - CVE-2017-16114
- Regular Expression Denial of Service in string package - CVE-2017-16116
- Regular Expression Denial of Service in moment - CVE-2017-18214
- Tags:
- npm
- slug
Anything's wrong? Let us know Last updated on January 12, 2023