CVE-2024-21538

Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
Configurations

No configuration.

History

19 May 2025, 04:15

Type Values Removed Values Added
Summary (en) Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string. (en) Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.

19 Nov 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349 -

08 Nov 2024, 19:01

Type Values Removed Values Added
Summary
  • (es) Las versiones del paquete cross-spawn anteriores a la 7.0.5 son vulnerables a la denegación de servicio por expresión regular (ReDoS) debido a una desinfección de entrada incorrecta. Un atacante puede aumentar el uso de la CPU y hacer que el programa se bloquee manipulando una cadena muy grande y bien manipulada.

08 Nov 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-08 05:15

Updated : 2025-05-20 15:16


NVD link : CVE-2024-21538

Mitre link : CVE-2024-21538

CVE.ORG link : CVE-2024-21538


JSON object : View

Products Affected

No product.

CWE
CWE-1333

Inefficient Regular Expression Complexity