CVE Vulnerabilities

CVE-2020-28469

Uncontrolled Resource Consumption

Published: Jun 03, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
Glob-parentGulpjs*5.1.2 (excluding)
Red Hat Enterprise Linux 8RedHatnodejs:16-8050020211206113934.c5368500*
Red Hat Enterprise Linux 8RedHatnodejs:14-8050020211213115342.c5368500*
Red Hat Enterprise Linux 8.4 Extended Update SupportRedHatnodejs:14-8040020211213111158.522a0ee4*
Red Hat Enterprise Linux 9RedHatnodejs-nodemon-0:2.0.19-1.el9_0*
Red Hat OpenShift Container Platform 4.8RedHatopenshift4/ose-console:v4.8.0-202107010336.p0.git.188a490.assembly.stream*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs12-nodejs-0:12.22.5-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-nodejs12-nodejs-0:12.22.5-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7*
Red Hat Virtualization Engine 4.4RedHatovirt-engine-ui-extensions-0:1.2.7-1.el8ev*
Red Hat Virtualization Engine 4.4RedHatovirt-web-ui-0:1.7.2-1.el8ev*
Node-glob-parentUbuntugroovy*
Node-glob-parentUbuntutrusty*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References