Inefficient Regular Expression Complexity in mocha
Cxb3ca64d2-9cd1
- mocha
- org.webjars.bower:mocha
- org.webjars:mocha
- org.webjars.npm:mocha
Summary
The package `mocha`is vulnerable to Regular Expression Denial of Service (ReDoS). The function `clean` in `utils.js` can make the server unavailable when a specially crafted input is provided. This issue affects versions prior to 10.1.0.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-1333 - Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
References
Advisory Timeline
- Published