Skip to content

Commit 528d4c8

Browse files
1 parent 288a46c commit 528d4c8

File tree

3 files changed

+210
-0
lines changed

3 files changed

+210
-0
lines changed
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-27v5-c462-wpq7",
4+
"modified": "2026-03-27T22:23:52Z",
5+
"published": "2026-03-27T22:23:52Z",
6+
"aliases": [
7+
"CVE-2026-4923"
8+
],
9+
"summary": "path-to-regexp vulnerable to Regular Expression Denial of Service via multiple wildcards",
10+
"details": "### Impact\n\nWhen using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path.\n\n**Unsafe examples:**\n\n```\n/*foo-*bar-:baz\n/*a-:b-*c-:d\n/x/*a-:b/*c/y\n```\n\n**Safe examples:**\n\n```\n/*foo-:bar\n/*foo-:bar-*baz\n```\n\n### Patches\n\nUpgrade to version `8.4.0`.\n\n### Workarounds\n\nIf developers are using multiple wildcard parameters, they can check the regex output with a tool such as https://makenowjust-labs.github.io/recheck/playground/ to confirm whether a path is vulnerable.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "path-to-regexp"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "8.0.0"
29+
},
30+
{
31+
"fixed": "8.4.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-27v5-c462-wpq7"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4923"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://cna.openjsf.org/security-advisories.html"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/pillarjs/path-to-regexp"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://makenowjust-labs.github.io/recheck/playground"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-1333"
63+
],
64+
"severity": "MODERATE",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-03-27T22:23:52Z",
67+
"nvd_published_at": "2026-03-26T19:17:08Z"
68+
}
69+
}
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-j3q9-mxjg-w52f",
4+
"modified": "2026-03-27T22:23:27Z",
5+
"published": "2026-03-27T22:23:27Z",
6+
"aliases": [
7+
"CVE-2026-4926"
8+
],
9+
"summary": "path-to-regexp vulnerable to Denial of Service via sequential optional groups",
10+
"details": "### Impact\n\nA bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service.\n\n### Patches\n\nFixed in version 8.4.0.\n\n### Workarounds\n\nLimit the number of sequential optional groups in route patterns. Avoid passing user-controlled input as route patterns.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "path-to-regexp"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "8.0.0"
29+
},
30+
{
31+
"fixed": "8.4.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-j3q9-mxjg-w52f"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://cna.openjsf.org/security-advisories.html"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/pillarjs/path-to-regexp"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-1333",
59+
"CWE-400"
60+
],
61+
"severity": "HIGH",
62+
"github_reviewed": true,
63+
"github_reviewed_at": "2026-03-27T22:23:27Z",
64+
"nvd_published_at": "2026-03-26T19:17:08Z"
65+
}
66+
}
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mvm6-f9r3-fgfx",
4+
"modified": "2026-03-27T22:22:28Z",
5+
"published": "2026-03-27T22:22:28Z",
6+
"aliases": [],
7+
"summary": "AWS SDK for .NET: Improper escaping of special characters in CloudFront policy document construction",
8+
"details": "### Summary \nThis notification is related to the CloudFront signing utilities in the AWS SDK for .NET, which are used to generate Amazon CloudFront signed URLs and signed cookies. A defense-in-depth enhancement has been implemented to improve handling of special characters, such as double quotes and backslashes, in input values. \n\n### Impact \nThe CloudFront signing utilities build policy documents that define access restrictions for signed URLs and cookies. If an application passes unsanitized input containing special characters to these utilities, the resulting policy document may not reflect the application's intended access restrictions. While the SDK was functioning safely within the requirements of the shared responsibility model, additional safeguards have been added to support secure customer implementations. Applications that already follow AWS security best practices for input validation are not impacted. \n\n### Impacted versions: \n- AWS SDK for .NET V3 (`AWSSDK.CloudFront`): < 3.7.510.7\n- AWS SDK for .NET V4 (`AWSSDK.Extensions.CloudFront.Signers`): 4.0.0.0 - 4.0.0.25 \n\n### Patches \nOn February 25th, 2026, an enhancement was made to the AWS SDK for .NET CloudFront signing utilities. The enhancement ensures that special characters in input values are correctly handled. We recommend upgrading to the latest version. \n\n### Workarounds \nNo workarounds are needed, but customers should ensure that your application is following security best practices: \n- Implement proper input validation in your application code before passing values to CloudFront signing utilities \n- Update to the latest AWS SDK release on a regular basis \n- Follow AWS security best practices for SDK configuration\n\n### References \nIf there are any questions or comments about this advisory, contact AWS Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.\n\n### Acknowledgement\nAWS SDK for .NET thanks the Amazon Inspector Security Research team for identifying this issue and working through the coordinated process together.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:H/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "NuGet",
19+
"name": "AWSSDK.CloudFront"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "3.7.510.7"
30+
}
31+
]
32+
}
33+
]
34+
},
35+
{
36+
"package": {
37+
"ecosystem": "NuGet",
38+
"name": "AWSSDK.Extensions.CloudFront.Signers"
39+
},
40+
"ranges": [
41+
{
42+
"type": "ECOSYSTEM",
43+
"events": [
44+
{
45+
"introduced": "4.0.0.0"
46+
},
47+
{
48+
"fixed": "4.0.0.26"
49+
}
50+
]
51+
}
52+
]
53+
}
54+
],
55+
"references": [
56+
{
57+
"type": "WEB",
58+
"url": "https://github.com/aws/aws-sdk-net/security/advisories/GHSA-mvm6-f9r3-fgfx"
59+
},
60+
{
61+
"type": "PACKAGE",
62+
"url": "https://github.com/aws/aws-sdk-net"
63+
}
64+
],
65+
"database_specific": {
66+
"cwe_ids": [
67+
"CWE-116",
68+
"CWE-20"
69+
],
70+
"severity": "HIGH",
71+
"github_reviewed": true,
72+
"github_reviewed_at": "2026-03-27T22:22:28Z",
73+
"nvd_published_at": null
74+
}
75+
}

0 commit comments

Comments
 (0)