org.webjars.bowergithub.micromatch:braces@1.8.5 vulnerabilities

  • latest version

    1.8.5

  • first published

    6 years ago

  • latest version published

    6 years ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.bowergithub.micromatch:braces package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Uncontrolled resource consumption

org.webjars.bowergithub.micromatch:braces is a Bash-like brace expansion, implemented in JavaScript.

Affected versions of this package are vulnerable to Uncontrolled resource consumption due improper limitation of the number of characters it can handle, through the parse function. An attacker can cause the application to allocate excessive memory and potentially crash by sending imbalanced braces as input.

How to fix Uncontrolled resource consumption?

A fix was pushed into the master branch but not yet published.

[0,)
  • L
Regular Expression Denial of Service (ReDoS)

org.webjars.bowergithub.micromatch:braces is a Bash-like brace expansion, implemented in JavaScript.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). It used a regular expression (^\{(,+(?:(\{,+\})*),*|,*(?:(\{,+\})*),+)\}) in order to detects empty braces. This can cause an impact of about 10 seconds matching time for data 50K characters long.

How to fix Regular Expression Denial of Service (ReDoS)?

There is no fixed version for org.webjars.bowergithub.micromatch:braces.

[0,)