Description
TF2 Item Format helps users format TF2 items to the community standards. Versions of `tf2-item-format` since at least `4.2.6` and prior to `5.9.14` are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input. This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any `tf2-item-format` to parse user input. Version `5.9.14` contains a fix for the issue.
Published: 2024-07-23
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2298 TF2 Item Format helps users format TF2 items to the community standards. Versions of `tf2-item-format` since at least `4.2.6` and prior to `5.9.14` are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input. This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any `tf2-item-format` to parse user input. Version `5.9.14` contains a fix for the issue.
Github GHSA Github GHSA GHSA-8h55-q5qq-p685 (ReDoS) Regular Expression Denial of Service in tf2-item-format
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T04:46:52.666Z

Reserved: 2024-07-18T15:21:47.481Z

Link: CVE-2024-41655

cve-icon Vulnrichment

Updated: 2024-08-02T04:46:52.666Z

cve-icon NVD

Status : Deferred

Published: 2024-07-23T15:15:05.207

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-41655

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses