CVE Vulnerabilities

CVE-2022-37603

Inefficient Regular Expression Complexity

Published: Oct 14, 2022 | Modified: May 15, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
Loader-utilsWebpack.js*1.4.2 (excluding)
Loader-utilsWebpack.js2.0.0 (including)2.0.4 (excluding)
Loader-utilsWebpack.js3.0.0 (including)3.2.1 (excluding)
Migration Toolkit for Runtimes 1 on RHEL 8RedHat*
Migration Toolkit for Runtimes 1 on RHEL 8RedHatloader-utils*
MTA-6.0-RHEL-8RedHatmta/mta-ui-rhel8:6.0.1-10*
Red Hat Data Grid 8.4.1RedHatloader-utils*
Red Hat Migration Toolkit for Containers 1.7RedHatrhmtc/openshift-migration-ui-rhel8:v1.7.8-5*
Red Hat Single Sign-On 7RedHatloader-utils*
Red Hat Single Sign-On 7.6 for RHEL 7RedHatrh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso*
Red Hat Single Sign-On 7.6 for RHEL 8RedHatrh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso*
Red Hat Single Sign-On 7.6 for RHEL 9RedHatrh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso*
RHEL-8 based Middleware ContainersRedHatrh-sso-7/sso76-openshift-rhel8:7.6-20*
RHOL-5.5-RHEL-8RedHatopenshift-logging/logging-view-plugin-rhel8:v5.5.5-2*
Node-loader-utilsUbuntubionic*
Node-loader-utilsUbuntufocal*
Node-loader-utilsUbuntukinetic*
Node-loader-utilsUbuntulunar*
Node-loader-utilsUbuntumantic*
Node-loader-utilsUbuntuoracular*
Node-loader-utilsUbuntuplucky*
Node-loader-utilsUbuntutrusty*
Node-loader-utilsUbuntuxenial*

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References