Inefficient Regular Expression Complexity Affecting org.webjars.npm:micromatch package, versions [,4.0.8)
Threat Intelligence
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGWEBJARSNPM-6913881
- published 5 Jun 2024
- disclosed 13 May 2024
- credit Mário Teixeira
Introduced: 13 May 2024
CVE-2024-4067 Open this link in a new tabHow to fix?
Upgrade org.webjars.npm:micromatch
to version 4.0.8 or higher.
Overview
Affected versions of this package are vulnerable to Inefficient Regular Expression Complexity due to the use of unsafe pattern configurations that allow greedy matching through the micromatch.braces()
function. An attacker can cause the application to hang or slow down by passing a malicious payload that triggers extensive backtracking in regular expression processing.
References
CVSS Scores
version 3.1