ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
{ "extracted_events": [ { "introduced": "0.7.14" }, { "fixed": "0.7.24" } ], "source": [ "CPE_FIELD", "REFERENCES" ], "cpe": "cpe:2.3:a:ua-parser-js_project:ua-parser-js:*:*:*:*:*:node.js:*:*" }
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-27292.json"
{ "source": "REFERENCES" }