Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
Please update uap-core to >= v0.11.0
Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
{ "nvd_published_at": "2021-02-16T18:15:00Z", "cwe_ids": [ "CWE-1333", "CWE-400" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-02-01T16:57:05Z" }