Incorrect Regular Expression in fast-csv - CVE-2020-26256
Published: November 21, 2023
Vulnerability identifier: #VU83348
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-26256
CWE-ID: CWE-185
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
fast-csv
fast-csv
Software vendor:
c2fo
c2fo
Description
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation when processing regular expressions. A remote user can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability..
External links
- https://github.com/C2FO/fast-csv/commit/4bbd39f26a8cd7382151ab4f5fb102234b2f829e
- https://github.com/C2FO/fast-csv/security/advisories/GHSA-8cv5-p934-3hwp
- https://www.npmjs.com/package/fast-csv
- https://www.npmjs.com/package/@fast-csv/parse
- https://lgtm.com/query/8609731774537641779/
- https://github.com/C2FO/fast-csv/issues/540