Inefficient Regular Expression Complexity Affecting grafana-image-renderer package, versions <3.11.6-r2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-GRAFANAIMAGERENDERER-8617590
  • published10 Jan 2025
  • disclosed5 Dec 2024

Introduced: 5 Dec 2024

CVE-2024-52798  (opens in a new tab)
CWE-1333  (opens in a new tab)

How to fix?

Upgrade Chainguard grafana-image-renderer to version 3.11.6-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grafana-image-renderer package and not the grafana-image-renderer package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of path-to-regexp. Upgrade to 0.1.12. This vulnerability exists because of an incomplete fix for CVE-2024-45296.

CVSS Scores

version 3.1