ua-parser-js 0.7.29

This package version has been yanked.


Yanked package versions cannot be used or downloaded from npm.

2 security vulnerabilities found in version 0.7.29

Embedded malware in ua-parser-js

critical severity GHSA-pjwm-rvh2-c87w
critical severity GHSA-pjwm-rvh2-c87w
Affected versions: = 0.7.29

The npm package ua-parser-js had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See this issue for details as they unfold.

Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

ReDoS Vulnerability in ua-parser-js version

high severity CVE-2022-25927
high severity CVE-2022-25927
Affected versions: < 0.7.33

Description:

A regular expression denial of service (ReDoS) vulnerability has been discovered in ua-parser-js.

Impact:

This vulnerability bypass the library's MAX_LENGTH input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.

Affected Versions:

All versions of the library prior to version 0.7.33 / 1.0.33.

Patches:

A patch has been released to remove the vulnerable regular expression, update to version 0.7.33 / 1.0.33 or later.

References:

Regular expression Denial of Service - ReDoS

Credits:

Thanks to @Snyk who first reported the issue.

No license issues detected.


This package version has a license in the source code.