CVE-2021-27292

ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ua-parser-js_project:ua-parser-js:*:*:*:*:*:node.js:*:*

History

23 Mar 2021, 20:21

Type Values Removed Values Added
CPE cpe:2.3:a:ua-parser-js_project:ua-parser-js:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE NVD-CWE-Other
References (MISC) https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566 - (MISC) https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566 - Patch, Third Party Advisory
References (MISC) https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76 - (MISC) https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76 - Exploit, Third Party Advisory
References (MISC) https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14 - (MISC) https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14 - Patch, Third Party Advisory

18 Mar 2021, 16:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566 -

17 Mar 2021, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-17 13:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-27292

Mitre link : CVE-2021-27292

CVE.ORG link : CVE-2021-27292


JSON object : View

Products Affected

ua-parser-js_project

  • ua-parser-js