Vulnerability Details : CVE-2021-27292
Potential exploit
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
Vulnerability category: Denial of service
Products affected by CVE-2021-27292
- Ua-parser-js Project » Ua-parser-js » For Node.jsVersions from including (>=) 0.7.14 and before (<) 0.7.24cpe:2.3:a:ua-parser-js_project:ua-parser-js:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-27292
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-27292
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
References for CVE-2021-27292
-
https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76
cve-2021-27292 · GitHubExploit;Third Party Advisory
-
https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566
Fix potential ReDoS vulnerability as reported by Doyensec · faisalman/ua-parser-js@809439e · GitHubPatch;Third Party Advisory
-
https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14
Fix several exponential/cubic complexity regexes found by Ben Caller/… · pygments/pygments@2e7e8c4 · GitHubPatch;Third Party Advisory
Jump to