Vulnerability Description
The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gulpjs | Glob-Parent | >= 6.0.0, < 6.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/gulpjs/glob-parent/commit/3e9f04a3b4349db7e1962d87c9a7398cda5PatchThird Party Advisory
- https://github.com/gulpjs/glob-parent/pull/49ExploitPatchThird Party Advisory
- https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294ExploitThird Party Advisory
- https://github.com/gulpjs/glob-parent/commit/3e9f04a3b4349db7e1962d87c9a7398cda5PatchThird Party Advisory
- https://github.com/gulpjs/glob-parent/pull/49ExploitPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230214-0010/
- https://security.snyk.io/vuln/SNYK-JS-GLOBPARENT-1314294ExploitThird Party Advisory
FAQ
What is CVE-2021-35065?
CVE-2021-35065 is a vulnerability with a CVSS score of 7.5 (HIGH). The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.
How severe is CVE-2021-35065?
CVE-2021-35065 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-35065?
Check the references section above for vendor advisories and patch information. Affected products include: Gulpjs Glob-Parent.