GHSA-p4pj-mg4r-x6v4

Suggest an improvement
Source
https://github.com/advisories/GHSA-p4pj-mg4r-x6v4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/02/GHSA-p4pj-mg4r-x6v4/GHSA-p4pj-mg4r-x6v4.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-p4pj-mg4r-x6v4
Aliases
Related
Published
2021-02-02T15:46:38Z
Modified
2024-02-08T22:17:20Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of Service in uap-core
Details

Impact

Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.

Patches

Please update uap-core to >= v0.11.0

Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.

Database specific
{
    "nvd_published_at": "2021-02-16T18:15:00Z",
    "cwe_ids": [
        "CWE-1333",
        "CWE-400"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-02-01T16:57:05Z"
}
References

Affected packages

npm / uap-core

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.0