Skip to content

fix(deps): update dependency path-to-regexp to v6.3.0 [security] #1384

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: sepolia
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Dec 30, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
path-to-regexp 6.2.1 -> 6.3.0 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-45296

Impact

A bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For example, /:a-:b.

Patches

For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.

These versions add backtrack protection when a custom regex pattern is not provided:

They do not protect against vulnerable user supplied capture groups. Protecting against explicit user patterns is out of scope for old versions and not considered a vulnerability.

Version 7.1.0 can enable strict: true and get an error when the regular expression might be bad.

Version 8.0.0 removes the features that can cause a ReDoS.

Workarounds

All versions can be patched by providing a custom regular expression for parameters after the first in a single segment. As long as the custom regular expression does not match the text before the parameter, you will be safe. For example, change /:a-:b to /:a-:b([^-/]+).

If paths cannot be rewritten and versions cannot be upgraded, another alternative is to limit the URL length. For example, halving the attack string improves performance by 4x faster.

Details

Using /:a-:b will produce the regular expression /^\/([^\/]+?)-([^\/]+?)\/?$/. This can be exploited by a path such as /a${'-a'.repeat(8_000)}/a. OWASP has a good example of why this occurs, but the TL;DR is the /a at the end ensures this route would never match but due to naive backtracking it will still attempt every combination of the :a-:b on the repeated 8,000 -a.

Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and can lead to a DoS. In local benchmarks, exploiting the unsafe regex will result in performance that is over 1000x worse than the safe regex. In a more realistic environment using Express v4 and 10 concurrent connections, this translated to average latency of ~600ms vs 1ms.

References


Release Notes

pillarjs/path-to-regexp (path-to-regexp)

v6.3.0: Fix backtracking in 6.x

Compare Source

Fixed

v6.2.2: Updated README

Compare Source

No API changes. Documentation only release.

Changed


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

vercel bot commented Dec 30, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
frontends ✅ Ready (Inspect) Visit Preview 💬 Add feedback Jun 10, 2025 4:35am

Copy link

netlify bot commented Dec 30, 2024

Deploy Preview for scroll-io failed.

Name Link
🔨 Latest commit e4554e2
🔍 Latest deploy log https://app.netlify.com/sites/scroll-io/deploys/677244b54770bb0008938fef

@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from e4554e2 to afefcae Compare December 30, 2024 07:15
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from afefcae to 2531542 Compare December 30, 2024 11:04
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 2531542 to 44b42db Compare January 8, 2025 02:51
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 44b42db to 62319b2 Compare January 12, 2025 15:53
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 62319b2 to 7ef22b7 Compare January 14, 2025 03:12
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 7ef22b7 to 5d7b91e Compare January 17, 2025 02:01
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 5d7b91e to 573ea5c Compare January 21, 2025 05:19
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 573ea5c to fa889e3 Compare January 22, 2025 13:56
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from fa889e3 to ac1f80d Compare January 23, 2025 01:27
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from ac1f80d to d0549ef Compare January 23, 2025 07:56
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from d0549ef to 8270d08 Compare January 25, 2025 01:03
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 8270d08 to 64f5366 Compare January 26, 2025 07:50
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 64f5366 to dcfc789 Compare January 29, 2025 02:13
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from dcfc789 to c5efc66 Compare January 29, 2025 02:27
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from dc31c73 to 576c8ec Compare April 16, 2025 10:57
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 576c8ec to a629704 Compare April 21, 2025 11:00
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from a629704 to 4b4b36b Compare April 21, 2025 11:18
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 4b4b36b to 7ddcc6a Compare April 29, 2025 05:39
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 7ddcc6a to 71a4cda Compare May 1, 2025 15:53
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 71a4cda to c41b128 Compare May 7, 2025 08:17
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from c41b128 to 2378c76 Compare May 7, 2025 08:42
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 2378c76 to a97aa49 Compare May 8, 2025 06:53
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from a97aa49 to afb8c3c Compare May 14, 2025 03:12
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from afb8c3c to 166bafb Compare May 14, 2025 04:10
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 166bafb to 6a6144e Compare June 4, 2025 06:51
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 6a6144e to b721535 Compare June 4, 2025 10:31
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from b721535 to 67ddf3d Compare June 5, 2025 01:18
@renovate renovate bot force-pushed the renovate/npm-path-to-regexp-vulnerability branch from 67ddf3d to 7b8b29a Compare June 10, 2025 04:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants