
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The NPM package micromatch
prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in micromatch.braces()
in index.js
because the pattern .*
will greedily match anything. This vulnerability was assigned CVE-2024-4067 and was discovered by the Checkmarx Research team (Checkmarx Advisory, DevHub Details).
The vulnerability is caused by a greedy regex pattern .*
in the micromatch.braces()
function that can lead to excessive backtracking. When processing input with malicious patterns, the regex engine will keep backtracking while searching for a closing bracket. The vulnerability has been assigned a CVSS v3.1 score of 5.3 (Medium) with vector string AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L (DevHub Details).
By passing a malicious payload, an attacker can cause the pattern matching to keep backtracking while searching for closing brackets. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down, effectively creating a denial of service condition (NVD).
The vulnerability was fixed in version 4.0.8 of micromatch. Users should upgrade to this version which includes the proper fix. The fix involves using a safe pattern that won't start backtracking the regular expression due to greedy matching. Note that versions 4.0.6 and 4.0.7 attempted to fix this issue but the vulnerability persisted (GitHub PR).
The vulnerability was initially reported by the Checkmarx Research team and went through a responsible disclosure process. After the initial fixes in versions 4.0.6 and 4.0.7 proved insufficient, version 4.0.8 was released as the ultimate fix for both CVE-2024-4067 and CVE-2024-4068. The maintainers have noted that while automated scanners may flag this as high severity, they consider the issues low-priority (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”