Vulnerability Name:

CVE-2021-23343 (CCN-201206)

Assigned:2021-05-04
Published:2021-05-04
Updated:2021-12-03
Summary:All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
5.3 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
CWE-400
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-23343

Source: XF
Type: UNKNOWN
pathparse-cve202123343-dos(201206)

Source: CCN
Type: path-parse GIT Repository
ReDoS in path-parse #8

Source: MISC
Type: Exploit, Issue Tracking, Third Party Advisory
https://github.com/jbgutierrez/path-parse/issues/8

Source: MLIST
Type: Mailing List, Third Party Advisory
[myfaces-dev] 20210531 Re: [VOTE] Release Tobago 4.5.4, 5.0.0-alpha-1 and checkstyle-rules 14

Source: MISC
Type: Exploit, Third Party Advisory
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028

Source: CCN
Type: SNYK-JS-PATHPARSE-1077067
Regular Expression Denial of Service (ReDoS)

Source: MISC
Type: Exploit, Third Party Advisory
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067

Source: CCN
Type: IBM Security Bulletin 6480413 (Planning Analytics Local)
IBM Planning Analytics Workspace is affected by security vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6507095 (Planning Analytics)
IBM Planning Analytics Workspace is affected by security vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6570957 (Cognos Analytics)
IBM Cognos Analytics has addressed multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6573633 (QRadar Use Case Manager)
IBM QRadar Use Case Manager app is vulnerable to using components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6575649 (Spectrum Discover)
Medium/low severity vulnerabilities in libraries used by IBM Spectrum Discover (libraries of libraries)

Source: CCN
Type: IBM Security Bulletin 6590981 (QRadar Data Synchronization App)
IBM QRadar Data Synchronization App for IBM QRadar SIEM is vulnerable to using components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6612791 (Cloud Pak System Software)
Multiple Vulnerabilities in Node.js affect IBM Cloud Pak System.

Source: CCN
Type: IBM Security Bulletin 6967283 (QRadar User Behavior Analytics)
IBM QRadar User Behavior Analytics is vulnerable to components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6991569 (Edge Application Manager)
Open Source Dependency Vulnerability

Source: CCN
Type: NPM Web site
path-parse

Vulnerable Configuration:Configuration 1:
  • cpe:/a:path-parse_project:path-parse:*:*:*:*:*:node.js:*:* (Version < 1.0.7)

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:planning_analytics:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:planning_analytics:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_user_behavior_analytics:1.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:119205
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:119395
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:119580
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:484
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:118708
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:118898
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:119505
    P
    Security update for nodejs14 (Important)
    2022-03-04
    oval:org.opensuse.security:def:119690
    P
    Security update for nodejs14 (Important)
    2022-03-04
    oval:org.opensuse.security:def:1723
    P
    Security update for nodejs14 (Important)
    2022-03-04
    oval:org.opensuse.security:def:118827
    P
    Security update for nodejs14 (Important)
    2022-03-04
    oval:org.opensuse.security:def:119017
    P
    Security update for nodejs14 (Important)
    2022-03-04
    oval:org.opensuse.security:def:119322
    P
    Security update for nodejs14 (Important)
    2022-03-04
    oval:org.opensuse.security:def:102281
    P
    Security update for nodejs14 (Important)
    2022-03-04
    oval:org.opensuse.security:def:118823
    P
    Security update for nodejs8 (Important)
    2022-03-03
    oval:org.opensuse.security:def:119013
    P
    Security update for nodejs8 (Important)
    2022-03-03
    oval:org.opensuse.security:def:119318
    P
    Security update for nodejs8 (Important)
    2022-03-03
    oval:org.opensuse.security:def:119501
    P
    Security update for nodejs8 (Important)
    2022-03-03
    oval:org.opensuse.security:def:119686
    P
    Security update for nodejs8 (Important)
    2022-03-03
    oval:org.opensuse.security:def:118820
    P
    Security update for nodejs12 (Important)
    2022-03-02
    oval:org.opensuse.security:def:119010
    P
    Security update for nodejs12 (Important)
    2022-03-02
    oval:org.opensuse.security:def:1721
    P
    Security update for nodejs12 (Important)
    2022-03-02
    oval:org.opensuse.security:def:119315
    P
    Security update for nodejs12 (Important)
    2022-03-02
    oval:org.opensuse.security:def:119498
    P
    Security update for nodejs12 (Important)
    2022-03-02
    oval:org.opensuse.security:def:119683
    P
    Security update for nodejs12 (Important)
    2022-03-02
    oval:org.opensuse.security:def:102279
    P
    Security update for nodejs12 (Important)
    2022-03-02
    oval:com.redhat.rhsa:def:20213666
    P
    RHSA-2021:3666: nodejs:14 security and bug fix update (Important)
    2021-09-27
    oval:com.redhat.rhsa:def:20213623
    P
    RHSA-2021:3623: nodejs:12 security and bug fix update (Important)
    2021-09-21
    BACK
    path-parse_project path-parse *
    ibm planning analytics 2.0
    ibm cognos analytics 11.2.0
    ibm cognos analytics 11.1.7
    ibm planning analytics 2.0
    ibm cognos analytics 11.2.1
    ibm qradar user behavior analytics 1.0.0