{"id":"GHSA-582f-p4pg-xc74","summary":"Regular Expression Denial of Service in csv-parse","details":"Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option.\n\n\n## Recommendation\n\nUpgrade to version 4.4.6 or later.","aliases":["CVE-2019-17592"],"modified":"2023-11-08T04:01:24.923017Z","published":"2019-10-15T20:06:16Z","database_specific":{"severity":"HIGH","github_reviewed_at":"2019-10-15T15:55:00Z","cwe_ids":["CWE-20","CWE-400"],"github_reviewed":true,"nvd_published_at":"2019-10-14T20:15:00Z"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17592"},{"type":"WEB","url":"https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a"},{"type":"PACKAGE","url":"https://github.com/adaltas/node-csv-parse"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20191127-0002"},{"type":"WEB","url":"https://www.npmjs.com/advisories/1171"}],"affected":[{"package":{"name":"csv-parse","ecosystem":"npm","purl":"pkg:npm/csv-parse"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"4.4.6"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/10/GHSA-582f-p4pg-xc74/GHSA-582f-p4pg-xc74.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}