Bug 1224255 (CVE-2024-4067) - VUL-0: CVE-2024-4067: TRACKERBUG: the npm package `micromatch` is vulnerable to Regular Expression Denial of Service (ReDoS)
Summary: VUL-0: CVE-2024-4067: TRACKERBUG: the npm package `micromatch` is vulnerable...
Status: NEW
Alias: CVE-2024-4067
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/405384/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-4067:7.5:(AV:N...
Keywords:
Depends on: 1224363 1224365 1224366 1224367 1224373 1224375 1224383 1224384 1224370 1224371 1224372 1224374 1224377 1224378 1224379 1224380 1224381 1224382 1224385
Blocks:
  Show dependency treegraph
 
Reported: 2024-05-15 08:02 UTC by SMASH SMASH
Modified: 2024-05-23 19:47 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-15 08:02:36 UTC
The NPM package `micromatch` is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-4067
https://www.cve.org/CVERecord?id=CVE-2024-4067
https://devhub.checkmarx.com/cve-details/CVE-2024-4067/
https://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448
https://github.com/micromatch/micromatch/issues/243
https://github.com/micromatch/micromatch/pull/247
Comment 1 Benjamin Greiner 2024-05-16 16:03:49 UTC
Upstream still argues whether this is really a vulnerability. No fix yet. So we have to wait.
Comment 2 Benjamin Greiner 2024-05-23 19:47:32 UTC
In most cases micromatch is only pulled in by eslint for development and not even present in runtime packages. The CVE scores for micromatch and braces are certainly way too alarmistic here. See upstream discussion.