CVE-2024-21539

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21539
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21539.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-21539
Aliases
Related
Published
2024-11-19T05:15:16Z
Modified
2024-11-20T00:52:27.038138Z
Summary
[none]
Details

Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability.

References

Affected packages

Git / github.com/eslint/rewrite

Affected ranges

Type
GIT
Repo
https://github.com/eslint/rewrite
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

compat-v1.*

compat-v1.0.0
compat-v1.0.1
compat-v1.0.2
compat-v1.0.3
compat-v1.1.0
compat-v1.1.1
compat-v1.2.0
compat-v1.2.1
compat-v1.2.2

config-array-v0.*

config-array-v0.14.0
config-array-v0.14.1
config-array-v0.15.0
config-array-v0.15.1
config-array-v0.16.0
config-array-v0.17.0
config-array-v0.17.1
config-array-v0.18.0
config-array-v0.19.0

core-v0.*

core-v0.1.0
core-v0.2.0
core-v0.3.0
core-v0.4.0
core-v0.5.0
core-v0.6.0
core-v0.7.0
core-v0.8.0

migrate-config-v1.*

migrate-config-v1.0.0
migrate-config-v1.0.1
migrate-config-v1.1.0
migrate-config-v1.1.1
migrate-config-v1.1.2
migrate-config-v1.2.0
migrate-config-v1.2.1
migrate-config-v1.3.0
migrate-config-v1.3.1
migrate-config-v1.3.2
migrate-config-v1.3.3

object-schema-v2.*

object-schema-v2.1.0
object-schema-v2.1.1
object-schema-v2.1.2
object-schema-v2.1.3
object-schema-v2.1.4

plugin-kit-v0.*

plugin-kit-v0.1.0
plugin-kit-v0.2.0
plugin-kit-v0.2.1
plugin-kit-v0.2.2