Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-5j4c-8p2g-v4jx] ReDoS vulnerability in vue package that is exploitable through inefficient regex evaluation in the parseHTML function #5075

Conversation

lennin-cp
Copy link

@lennin-cp lennin-cp commented Dec 11, 2024

Updates

  • Affected products
  • CVSS v3
  • CVSS v4

Comments
The issue is patched in the HeroDevs version Vue NES (2.6.18+, 2.7.20+)

@github-actions github-actions bot changed the base branch from main to lennin-cp/advisory-improvement-5075 December 11, 2024 22:13
@darakian
Copy link
Contributor

Hi @lennin-cp, the version your suggesting doesn't seem to exist
https://www.npmjs.com/package/vue/v/2.7.22

@lennin-cp
Copy link
Author

@darakian, it's not fixed in a community version, but a paid version offered by HeroDevs, see https://www.herodevs.com/blog-posts/cve-2024-9506-vue-2-redos-vulnerability-details-and-mitigation

@darakian
Copy link
Contributor

I see. So, our scope is strictly limited to public packages on public registries.
https://github.com/github/advisory-database?tab=readme-ov-file#supported-ecosystems
We cannot inspect nor recommend private packages.

@darakian darakian closed this Dec 12, 2024
@github-actions github-actions bot deleted the lennin-cp-GHSA-5j4c-8p2g-v4jx branch December 12, 2024 17:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants