ua-parser-js 0.7.28
ReDoS Vulnerability in ua-parser-js version
high severity GHSA-fhg7-m89q-25r3< 0.7.33
Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in ua-parser-js
.
Impact:
This vulnerability bypass the library's MAX_LENGTH
input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.
Affected Versions:
All versions of the library prior to version 0.7.33
/ 1.0.33
.
Patches:
A patch has been released to remove the vulnerable regular expression, update to version 0.7.33
/ 1.0.33
or later.
References:
Regular expression Denial of Service - ReDoS
Credits:
Thanks to @Snyk who first reported the issue.
ReDoS Vulnerability in ua-parser-js version
high severity CVE-2022-25927< 0.7.33
Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in ua-parser-js
.
Impact:
This vulnerability bypass the library's MAX_LENGTH
input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.
Affected Versions:
All versions of the library prior to version 0.7.33
/ 1.0.33
.
Patches:
A patch has been released to remove the vulnerable regular expression, update to version 0.7.33
/ 1.0.33
or later.
References:
Regular expression Denial of Service - ReDoS
Credits:
Thanks to @Snyk who first reported the issue.
No license issues detected.
This package version has a license in the source code.
This package version is available.
This package version has not been yanked and is still available for usage.