{ "schema_version": "1.4.0", "id": "GHSA-f523-2f5j-gfcg", "modified": "2023-09-13T19:38:19Z", "published": "2018-08-29T23:04:14Z", "aliases": [ "CVE-2017-16115" ], "summary": "Regular Expression Denial of Service in timespan", "details": "Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates.\n\nThe amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds.\n\n\n## Recommendation\n\nNo direct patch is available for this vulnerability.\n\nCurrently, the best available solution is to use a functionally equivalent alternative package.\n\nIt is also sufficient to ensure that user input is not being passed into `timespan`, or that the maximum length of such user input is drastically reduced. Limiting the input length to 150 characters should be sufficient in most cases.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "timespan" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "last_affected": "2.3.0" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16115" }, { "type": "WEB", "url": "https://github.com/indexzero/TimeSpan.js/issues/10" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-f523-2f5j-gfcg" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/533" } ], "database_specific": { "cwe_ids": [ "CWE-400" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:33:38Z", "nvd_published_at": null } }