A Regular Expression Denial of Service (ReDoS) vulnerability exists in lunary-ai/lunary version git f07a845. The server uses the regex /{.*?}/ to match user-controlled strings. In the default JavaScript regex engine, this regex can take polynomial time to match certain crafted user inputs. As a result, an attacker can cause the server to hang for an arbitrary amount of time by submitting a specially crafted payload. This issue is fixed in version 1.4.26.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Regular Expression Denial of Service (ReDoS) vulnerability exists in lunary-ai/lunary version git f07a845. The server uses the regex /{.*?}/ to match user-controlled strings. In the default JavaScript regex engine, this regex can take polynomial time to match certain crafted user inputs. As a result, an attacker can cause the server to hang for an arbitrary amount of time by submitting a specially crafted payload. This issue is fixed in version 1.4.26. | |
Title | Regular Expression Denial of Service (ReDoS) in lunary-ai/lunary | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:11:04.121Z
Updated: 2025-03-20T15:48:48.598Z
Reserved: 2024-09-19T13:24:21.025Z
Link: CVE-2024-8998

Updated: 2025-03-20T15:48:45.285Z

Status : Awaiting Analysis
Published: 2025-03-20T10:15:45.707
Modified: 2025-03-20T16:15:14.823
Link: CVE-2024-8998

No data.