The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Is-svg | Is-svg_project | 2.1.0 (including) | 4.2.1 (including) |
| Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8 | RedHat | rhacm2/console-api-rhel8:v2.3.0-63 | * |
| Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8 | RedHat | rhacm2/search-ui-rhel8:v2.3.0-59 | * |
| Red Hat OpenShift Container Platform 4.8 | RedHat | openshift4/ose-thanos-rhel8:v4.8.0-202106291913.p0.git.c358e96.assembly.stream | * |
| Red Hat OpenShift Container Platform 4.9 | RedHat | openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream | * |
Attackers can create crafted inputs that
intentionally cause the regular expression to use
excessive backtracking in a way that causes the CPU
consumption to spike.