{ "schema_version": "1.4.0", "id": "GHSA-g95f-p29q-9xw4", "modified": "2021-08-04T21:35:07Z", "published": "2019-06-06T15:30:30Z", "aliases": [], "summary": "Regular Expression Denial of Service in braces", "details": "Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.\n\n\n## Recommendation\n\nUpgrade to version 2.3.1 or higher.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "braces" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.3.1" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451" }, { "type": "WEB", "url": "https://snyk.io/vuln/npm:braces:20180219" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/786" } ], "database_specific": { "cwe_ids": [ "CWE-185", "CWE-400" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2019-06-06T09:40:51Z", "nvd_published_at": null } }