Skip to main content

Inefficient Regular Expression Complexity in mocha

Cxb3ca64d2-9cd1

  • mocha
  • org.webjars.bower:mocha
  • org.webjars:mocha
  • org.webjars.npm:mocha
Severity High
Score 7.5/10

Summary

The package `mocha`is vulnerable to Regular Expression Denial of Service (ReDoS). The function `clean` in `utils.js` can make the server unavailable when a specially crafted input is provided. This issue affects versions prior to 10.1.0.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-1333 - Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Advisory Timeline

  • Published