Vulnerability Details : CVE-2020-26308
Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
Vulnerability category: Denial of service
Products affected by CVE-2020-26308
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2020-26308
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-26308
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.7
|
HIGH | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/V... |
N/A
|
N/A
|
GitHub, Inc. | 2024-10-26 |
8.7
|
HIGH | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/V... |
N/A
|
N/A
|
GitHub, Inc. | 2024-10-26 |
CWE ids for CVE-2020-26308
-
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.Assigned by:
- a0819718-46f1-4df5-94e2-005712e83aaa (Primary)
- security-advisories@github.com (Primary)
References for CVE-2020-26308
-
https://github.com/ansman/validate.js/issues/342
Security Issue: Request for contact · Issue #342 · ansman/validate.js · GitHub
-
https://securitylab.github.com/advisories/GHSL-2020-302-redos-validate.js/
GHSL-2020-302: Regular Expression Denial of Service (ReDoS) in validate.js - CVE-2020-26308 | GitHub Security Lab
Jump to