View all vulnerabilities

CVE-2017-16137

Regular Expression Denial of Service in debug

Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter. As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.This was later re-introduced in version v3.2.0, and then repatched in versions 3.2.7 and 4.3.1.## RecommendationVersion 2.x.x: Update to version 2.6.9 or later.Version 3.1.x: Update to version 3.1.0 or later.Version 3.2.x: Update to version 3.2.7 or later.Version 4.x.x: Update to version 4.3.1 or later.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
3.6
Score Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Versions
debug < 2.6.9; debug >= 3.0.0 < 3.1.0; debug >= 3.2.0 < 3.2.7; debug >= 4.0.0 < 4.3.1
Severity
Low
Ecosystem
JavaScript
Publish Date
August 9, 2018
Modified Date
March 25, 2024