You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have searched existing issues, it hasn't been reported yet
Issue description
📌 Description
The current version of cross-spawn used in this project contains a Regular Expression Denial of Service (ReDoS) vulnerability, identified as CVE-2024-21538, with a CVSS score of 8.7 (High).
🛑 Impact
This vulnerability could allow an attacker to exploit regular expression processing, leading to excessive resource consumption (high CPU usage, potential denial of service).
✅ Recommended Fix
Please update cross-spawn to one of the patched versions:
Are you certain it's a bug?
Are you using the latest plugin release?
Is there an existing issue for this?
Issue description
📌 Description
The current version of cross-spawn used in this project contains a Regular Expression Denial of Service (ReDoS) vulnerability, identified as CVE-2024-21538, with a CVSS score of 8.7 (High).
🛑 Impact
This vulnerability could allow an attacker to exploit regular expression processing, leading to excessive resource consumption (high CPU usage, potential denial of service).
✅ Recommended Fix
Please update cross-spawn to one of the patched versions:
🔗 References
CVE-2024-21538
CWE-1333
Let me know if I can provide any further details. Thanks! 🙏
Service configuration (serverless.yml) content
N/A
Command name and used flags
N/A
Command output
Environment information
The text was updated successfully, but these errors were encountered: