Vulnerability Description
Async <= 2.6.4 and <= 3.2.5 are vulnerable to ReDoS (Regular Expression Denial of Service) while parsing function in autoinject function. NOTE: this is disputed by the supplier because there is no realistic threat model: regular expressions are not used with untrusted input.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/caolan/async/blob/v3.2.5/lib/autoInject.js#L41
- https://github.com/caolan/async/blob/v3.2.5/lib/autoInject.js#L6
- https://github.com/caolan/async/issues/1975#issuecomment-2204528153
- https://github.com/zunak/CVE-2024-39249
- https://github.com/zunak/CVE-2024-39249/issues/1
- https://github.com/caolan/async/blob/v3.2.5/lib/autoInject.js#L41
- https://github.com/caolan/async/blob/v3.2.5/lib/autoInject.js#L6
- https://github.com/caolan/async/issues/1975#issuecomment-2204528153
- https://github.com/zunak/CVE-2024-39249
- https://github.com/zunak/CVE-2024-39249/issues/1
FAQ
What is CVE-2024-39249?
CVE-2024-39249 is a vulnerability with a CVSS score of 7.5 (HIGH). Async <= 2.6.4 and <= 3.2.5 are vulnerable to ReDoS (Regular Expression Denial of Service) while parsing function in autoinject function. NOTE: this is disputed by the supplier because there is no rea...
How severe is CVE-2024-39249?
CVE-2024-39249 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-39249?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.