Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
Please update uap-core to >= v0.11.0
Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
{
"nvd_published_at": "2021-02-16T18:15:00Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-1333",
"CWE-400"
],
"severity": "HIGH",
"github_reviewed_at": "2021-02-01T16:57:05Z"
}