CVE-2026-24001

LOW
中文标题:
(暂无数据)
英文标题:
jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch
CVSS分数: 2.7
发布时间: 2026-01-22 02:23:44
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v1
漏洞描述
中文描述:

(暂无数据)

英文描述:

jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, and 4.0.4, attempting to parse a patch whose filename headers contain the line break characters `\r`, `\u2028`, or `\u2029` can cause the `parsePatch` method to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory. Applications are therefore likely to be vulnerable to a denial-of-service attack if they call `parsePatch` with a user-provided patch as input. A large payload is not needed to trigger the vulnerability, so size limits on user input do not provide any protection. Furthermore, some applications may be vulnerable even when calling `parsePatch` on a patch generated by the application itself if the user is nonetheless able to control the filename headers (e.g. by directly providing the filenames of the files to be diffed). The `applyPatch` method is similarly affected if (and only if) called with a string representation of a patch as an argument, since under the hood it parses that string using `parsePatch`. Other methods of the library are unaffected. Finally, a second and lesser interdependent bug - a ReDOS - also exhibits when those same line break characters are present in a patch's *patch* header (also known as its "leading garbage"). A maliciously-crafted patch header of length *n* can take `parsePatch` O(*n*³) time to parse. Versions 8.0.3, 5.2.2, and 4.0.4 contain a fix. As a workaround, do not attempt to parse patches that contain any of these characters: `\r`, `\u2028`, or `\u2029`.

CWE类型:
CWE-400 CWE-1333
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
kpdecker jsdiff >= 6.0.0, < 8.0.3 - - cpe:2.3:a:kpdecker:jsdiff:>=_6.0.0,_<_8.0.3:*:*:*:*:*:*:*
kpdecker jsdiff >= 5.0.0, < 5.2.2 - - cpe:2.3:a:kpdecker:jsdiff:>=_5.0.0,_<_5.2.2:*:*:*:*:*:*:*
kpdecker jsdiff < 4.0.4 - - cpe:2.3:a:kpdecker:jsdiff:<_4.0.4:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx x_refsource_CONFIRM
cve.org
访问
https://github.com/kpdecker/jsdiff/issues/653 x_refsource_MISC
cve.org
访问
https://github.com/kpdecker/jsdiff/pull/649 x_refsource_MISC
cve.org
访问
https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5 x_refsource_MISC
cve.org
访问
CVSS评分详情
4.0 (cna)
LOW
2.7
CVSS向量: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U
机密性
NONE
完整性
NONE
可用性
LOW
后续系统影响 (Subsequent):
机密性
NONE
完整性
NONE
可用性
NONE
时间信息
发布时间:
2026-01-22 02:23:44
修改时间:
2026-01-22 02:23:44
创建时间:
2026-01-22 06:00:11
更新时间:
2026-01-22 06:00:11
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-24001 2026-01-22 03:19:50 2026-01-21 22:00:11
版本与语言
当前版本: v1
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
暂无变更历史