Skip to main content

Inefficient Regular Expression Complexity in ansi-regex

CVE-2021-3807

  • ansi-regex
  • cx-dummy-package
  • org.webjars:ansi-regex
  • org.webjars.bower:ansi-regex
  • org.webjars.npm:ansi-regex
Severity High
Score 7.5/10

Summary

The package ansi-regex versions 3.x prior to 3.0.1, 4.x prior to 4.1.1, 5.x prior to 5.0.1 and 6.0.x prior to 6.0.1 is vulnerable to Inefficient Regular Expression Complexity

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-1333 - Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Advisory Timeline

  • Published