You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
CVE-2022-25858 | Unknown
terser is vulnerable to regular expression denial of service. The
vulnerability exists in index.js and evaluate.js because regular
expressions used are not properly handled which allows an attacker
to send crafted requests which causes an application crash
path of the issue:
file9579178566_1660814181915_html/WebUI_18_08_2022.2/node_modules/terser
Expected behavior ☀️
The latest version(5.14.2) of "terser" should be used.
Reproduction Example 👾
Install the library in any sample project.
Scan the sample project binaries with "Veracode" or any other security tool.
Environment 🖥
This is a security issue and can be reproduced in any environment by scanning the library with any security tool.
The text was updated successfully, but these errors were encountered:
We can't update it currently due https://github.com/terser/html-minifier-terser/blob/master/package.json#L44, we still support node.js v10, but we want to make a major release soon and drop old Node.js versions and update deps, the original problem was solved by terser, so just update your transitive deps, sorry for delay and feel free to feedback
Current behavior 💣
CVE-2022-25858 | Unknown
terser is vulnerable to regular expression denial of service. The
vulnerability exists in index.js and evaluate.js because regular
expressions used are not properly handled which allows an attacker
to send crafted requests which causes an application crash
path of the issue:
file9579178566_1660814181915_html/WebUI_18_08_2022.2/node_modules/terser
Expected behavior ☀️
The latest version(5.14.2) of "terser" should be used.
Reproduction Example 👾
Environment 🖥
This is a security issue and can be reproduced in any environment by scanning the library with any security tool.
The text was updated successfully, but these errors were encountered: