ReDoS Vulnerability in ua-parser-js version
High severity
GitHub Reviewed
Published
Jan 23, 2023
in
faisalman/ua-parser-js
•
Updated Jun 21, 2023
Package
Affected versions
< 0.7.33
>= 0.8.0, < 1.0.33
Patched versions
0.7.33
1.0.33
Description
Published to the GitHub Advisory Database
Jan 24, 2023
Reviewed
Jan 24, 2023
Published by the National Vulnerability Database
Jan 26, 2023
Last updated
Jun 21, 2023
Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in
ua-parser-js
.Impact:
This vulnerability bypass the library's
MAX_LENGTH
input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.Affected Versions:
All versions of the library prior to version
0.7.33
/1.0.33
.Patches:
A patch has been released to remove the vulnerable regular expression, update to version
0.7.33
/1.0.33
or later.References:
Regular expression Denial of Service - ReDoS
Credits:
Thanks to @snyk who first reported the issue.
References