-
CVSS Score
-The vulnerability stems from improper input validation in the indexOf implementation. The GitHub advisory specifically references line 192 in src/fast-string-search.c, which is part of the input processing logic. The Snyk PoC demonstrates passing a numeric input to indexOf triggers memory reuse from previous operations. This indicates the C++ binding for indexOf fails to validate input types before performing string operations, using stale length values from previous allocations when non-string inputs are provided.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| fast-string-search | npm | <= 1.4.3 |