Search for packages
| purl | pkg:deb/debian/node-ua-parser-js@0.7.24%2Bds-1 |
| Next non-vulnerable version | 0.8.1+ds+~0.7.36-3 |
| Latest non-vulnerable version | 0.8.1+ds+~0.7.36-3 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-jzj3-ddrr-u7hd
Aliases: CVE-2022-25927 GHSA-fhg7-m89q-25r3 GMS-2023-120 |
ReDoS Vulnerability in ua-parser-js version ### Description: A regular expression denial of service (ReDoS) vulnerability has been discovered in `ua-parser-js`. ### Impact: This vulnerability bypass the library's `MAX_LENGTH` input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition. ### Affected Versions: From version `0.7.30` to before versions `0.7.33` / `1.0.33`. ### Patches: A patch has been released to remove the vulnerable regular expression, update to version `0.7.33` / `1.0.33` or later. ### References: [Regular expression Denial of Service - ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) ### Credits: Thanks to @Snyk who first reported the issue. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-6c98-q4en-3uek | ua-parser-js Regular Expression Denial of Service vulnerability The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info). |
CVE-2020-7793
GHSA-394c-5j6w-4xmx |
| VCID-j1g9-gab7-cbch | Regular Expression Denial of Service (ReDoS) in ua-parser-js ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time. |
CVE-2021-27292
GHSA-78cj-fxph-m83p |