Learn about CVE-2020-28469 affecting glob-parent before 5.1.2, leading to Regular Expression Denial of Service (ReDoS) vulnerability. Find mitigation steps and preventive measures.
This CVE involves a vulnerability in the package glob-parent before version 5.1.2, leading to Regular Expression Denial of Service (ReDoS) due to a flawed enclosure regex.
Understanding CVE-2020-28469
This vulnerability, identified as Regular Expression Denial of Service (ReDoS), affects the glob-parent package before version 5.1.2.
What is CVE-2020-28469?
CVE-2020-28469 is a security vulnerability in the glob-parent package that allows Regular Expression Denial of Service (ReDoS) attacks due to a faulty enclosure regex.
The Impact of CVE-2020-28469
The impact of this CVE is rated as MEDIUM with a CVSS base score of 5.3. It can be exploited with low attack complexity and network access, affecting availability but not confidentiality or integrity.
Technical Details of CVE-2020-28469
This section provides technical details of the CVE.
Vulnerability Description
The vulnerability lies in the glob-parent package before version 5.1.2, where the enclosure regex used to check for strings ending in enclosure containing path separator is flawed, allowing for ReDoS attacks.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by crafting malicious inputs that trigger the flawed enclosure regex, causing the system to hang or become unresponsive.
Mitigation and Prevention
Protect your systems from CVE-2020-28469 with the following measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates