Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-27290

Опубликовано: 12 мар. 2021
Источник: debian

Описание

ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-ssrifixed8.0.1-1package
node-ssrino-dsabusterpackage

Примечания

  • https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf

  • https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2 (v8.0.1)

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 5 лет назад

ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.

CVSS3: 7.5
redhat
почти 5 лет назад

ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.

CVSS3: 7.5
nvd
почти 5 лет назад

ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.

CVSS3: 7.5
github
почти 5 лет назад

Regular Expression Denial of Service (ReDoS)

CVSS3: 7.5
fstec
больше 4 лет назад

Уязвимость библиотеки ssri прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании