CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-52798

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00035/1

CVE-2024-52798 affects the path-to-regexp library, potentially leading to denial-of-service. This vulnerability stems from a regular expression that is susceptible to catastrophic backtracking, causing performance issues. The vulnerability is present in the 0.1.x versions of path-to-regexp, and upgrading to version 0.1.12 is advised to mitigate the risk. CVE-2024-52798 is due to an incomplete fix for CVE-2024-45296. Although the SVRS score is 30, indicating a lower immediate threat compared to critical vulnerabilities, the 'In The Wild' tag suggests active exploitation should be monitored. Exploitation of this vulnerability could lead to significant resource consumption and service disruption. This vulnerability highlights the importance of promptly applying security patches.

In The Wild
X_refsource_MISC
X_refsource_CONFIRM
2024-12-05

2025-01-24
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-52798 is a vulnerability with a currently unavailable description. However, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a moderate risk level that requires attention. The vulnerability is categorized as "In The Wild," meaning it is being actively exploited by hackers.

Key Insights

  1. Active Exploitation: The "In The Wild" tag highlights that attackers are currently exploiting CVE-2024-52798. This signifies an immediate and urgent need to address the vulnerability.
  2. Limited Information: The lack of a description for CVE-2024-52798 underscores the importance of proactively seeking information from reputable sources like SOCRadar, CISA advisories, and vulnerability databases.
  3. Moderate Risk: The SVRS of 30, while not critical, indicates that the vulnerability poses a significant risk to organizations. This underscores the need for immediate mitigation measures.
  4. Unknown Impact: Without a description, the full extent of the vulnerability's impact remains unknown. This emphasizes the importance of actively monitoring for signs of compromise and implementing robust security measures.

Mitigation Strategies

  1. Emergency Patching: Prioritize patching systems affected by CVE-2024-52798 as soon as possible. This is crucial to prevent exploitation.
  2. Threat Intelligence Gathering: Actively monitor for updates on CVE-2024-52798 through SOCRadar, CISA advisories, and vulnerability databases. This will provide valuable insights into the vulnerability's nature and potential exploitation techniques.
  3. Network Segmentation: Implement network segmentation to isolate critical systems and limit the potential impact of a successful exploit.
  4. Intrusion Detection and Prevention: Enhance security posture by deploying intrusion detection and prevention systems to identify and block malicious activity.

Additional Information

For further details and guidance on mitigating CVE-2024-52798, users can utilize the "Ask to Analyst" feature, contact SOCRadar directly, or open a support ticket.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-52798 | pillarjs path-to-regexp up to 0.1.11 redos (GHSA-rhx6-c78j-4q9w / Nessus ID 216666)
vuldb.com2025-02-23
CVE-2024-52798 | pillarjs path-to-regexp up to 0.1.11 redos (GHSA-rhx6-c78j-4q9w / Nessus ID 216666) | A vulnerability was found in pillarjs path-to-regexp up to 0.1.11. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The identification of this vulnerability is CVE-2024-52798. The attack may be initiated remotely. There is no exploit available
vuldb.com
rss
forum
news
CVE-2024-52798 | pillarjs path-to-regexp up to 0.1.11 redos (GHSA-rhx6-c78j-4q9w)
vuldb.com2024-12-06
CVE-2024-52798 | pillarjs path-to-regexp up to 0.1.11 redos (GHSA-rhx6-c78j-4q9w) | A vulnerability was found in pillarjs path-to-regexp up to 0.1.11. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The identification of this vulnerability is CVE-2024-52798. The attack may be initiated remotely. There is no exploit available. It is recommended
vuldb.com
rss
forum
news

Social Media

IBM Sécurité, La faille QRadar Advisor CVE-2024-52798 permettait la fuite d’informations sensibles. https://t.co/Xi8vipEujc
0
0
0
CVE-2024-52798 path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor pe… https://t.co/u0kQglUF2G
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
AF854A3A-2127-422B-91AE-364DA2661108https://security.netapp.com/advisory/ntap-20250124-0002/
[email protected]https://github.com/pillarjs/path-to-regexp/commit/f01c26a013b1889f0c217c643964513acf17f6a4
[email protected]https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w
HTTPS://GITHUB.COM/PILLARJS/PATH-TO-REGEXP/COMMIT/F01C26A013B1889F0C217C643964513ACF17F6A4https://github.com/pillarjs/path-to-regexp/commit/f01c26a013b1889f0c217c643964513acf17f6a4
HTTPS://GITHUB.COM/PILLARJS/PATH-TO-REGEXP/SECURITY/ADVISORIES/GHSA-RHX6-C78J-4Q9Whttps://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w

CWE Details

CWE IDCWE NameDescription
CWE-1333Inefficient Regular Expression ComplexityThe product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence