ua-parser-js 0.7.26

2 security vulnerabilities found in version 0.7.26

ReDoS Vulnerability in ua-parser-js version

high severity GHSA-fhg7-m89q-25r3
high severity GHSA-fhg7-m89q-25r3
Affected versions: < 0.7.33

Description:

A regular expression denial of service (ReDoS) vulnerability has been discovered in ua-parser-js.

Impact:

This vulnerability bypass the library's MAX_LENGTH input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.

Affected Versions:

All versions of the library prior to version 0.7.33 / 1.0.33.

Patches:

A patch has been released to remove the vulnerable regular expression, update to version 0.7.33 / 1.0.33 or later.

References:

Regular expression Denial of Service - ReDoS

Credits:

Thanks to @Snyk who first reported the issue.

ReDoS Vulnerability in ua-parser-js version

high severity CVE-2022-25927
high severity CVE-2022-25927
Affected versions: < 0.7.33

Description:

A regular expression denial of service (ReDoS) vulnerability has been discovered in ua-parser-js.

Impact:

This vulnerability bypass the library's MAX_LENGTH input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.

Affected Versions:

All versions of the library prior to version 0.7.33 / 1.0.33.

Patches:

A patch has been released to remove the vulnerable regular expression, update to version 0.7.33 / 1.0.33 or later.

References:

Regular expression Denial of Service - ReDoS

Credits:

Thanks to @Snyk who first reported the issue.

Author did not declare license for this package in the source code.


This package version has a MIT license in the source code, however it was not declared in the source code.

This package version is available.


This package version has not been yanked and is still available for usage.