Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. mosca
  4. ›
  5. CVE-2018-11615

CVE-2018-11615: Incorrect Regular Expression

August 30, 2018 (updated October 9, 2019)

This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vulnerability to deny access to the target system.

References

  • nvd.nist.gov/vuln/detail/CVE-2018-11615
  • zerodayinitiative.com/advisories/ZDI-18-583

Code Behaviors & Features

Detect and mitigate CVE-2018-11615 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

Version 2.8.1

Fixed versions

  • 2.8.2

Solution

Upgrade to version 2.8.2 or above.

Impact 7.5 HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-185: Incorrect Regular Expression

Source file

npm/mosca/CVE-2018-11615.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.