CVE Vulnerabilities

CVE-2022-37603

Inefficient Regular Expression Complexity

Published: Oct 14, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

Name Vendor Start Version End Version
Loader-utils Webpack.js * 1.4.2 (excluding)
Loader-utils Webpack.js 2.0.0 (including) 2.0.4 (excluding)
Loader-utils Webpack.js 3.0.0 (including) 3.2.1 (excluding)
Migration Toolkit for Runtimes 1 on RHEL 8 RedHat loader-utils *
Migration Toolkit for Runtimes 1 on RHEL 8 RedHat loader-utils *
MTA-6.0-RHEL-8 RedHat mta/mta-ui-rhel8:6.0.1-10 *
Red Hat Data Grid 8.4.1 RedHat loader-utils *
Red Hat Migration Toolkit for Containers 1.7 RedHat rhmtc/openshift-migration-ui-rhel8:v1.7.8-5 *
Red Hat Single Sign-On 7 RedHat loader-utils *
Red Hat Single Sign-On 7.6 for RHEL 7 RedHat rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso *
Red Hat Single Sign-On 7.6 for RHEL 8 RedHat rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso *
Red Hat Single Sign-On 7.6 for RHEL 9 RedHat rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso *
RHEL-8 based Middleware Containers RedHat rh-sso-7/sso76-openshift-rhel8:7.6-20 *
RHOL-5.5-RHEL-8 RedHat openshift-logging/logging-view-plugin-rhel8:v5.5.5-2 *
Node-loader-utils Ubuntu bionic *
Node-loader-utils Ubuntu kinetic *
Node-loader-utils Ubuntu lunar *
Node-loader-utils Ubuntu mantic *
Node-loader-utils Ubuntu trusty *
Node-loader-utils Ubuntu xenial *

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References