Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-27292

Опубликовано: 11 фев. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.

A regular expression denial of service (ReDoS) vulnerability was found in the npm library ua-parser-js. If a supplied user agent matches the Noble string and contains many spaces then the regex will conduct backtracking, taking an ever increasing amount of time depending on the number of spaces supplied. An attacker can use this vulnerability to potentially craft a malicious user agent resulting in a denial of service.

Отчет

While some components do package a vulnerable version of ua-parser-js, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:

  • OpenShift Container Platform (OCP)
  • OpenShift ServiceMesh (OSSM)
  • Red Hat OpenShift Jaeger (RHOSJ)
  • Red Hat OpenShift Logging The OCP presto-container does ship the vulnerable component, however since OCP 4.6 the Metering product has been deprecated [1], set as wont-fix and may be fixed in a future release. Red Hat Advanced Cluster Management for Kubernetes (RHACM) ships graphql-tools that pulls 0.7.23 version of ua-parser-js that uses the affected code. [1] - https://access.redhat.com/solutions/5707561

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.0servicemesh-grafanaAffected
OpenShift Service Mesh 2.0servicemesh-prometheusAffected
Red Hat Ceph Storage 2grafanaOut of support scope
Red Hat Ceph Storage 3grafanaNot affected
Red Hat Ceph Storage 3grafana-containerNot affected
Red Hat Ceph Storage 4rhceph/rhceph-4-dashboard-rhel8Not affected
Red Hat OpenShift Container Platform 3.11kibanaFix deferred
Red Hat OpenShift Container Platform 3.11openshift3/grafanaNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-grafanaFix deferred
Red Hat OpenShift Container Platform 4openshift4/ose-logging-kibana6Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1940613nodejs-ua-parser-js: ReDoS via malicious User-Agent header

EPSS

Процентиль: 50%
0.00266
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 5 лет назад

ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.

CVSS3: 7.5
nvd
почти 5 лет назад

ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.

CVSS3: 7.5
debian
почти 5 лет назад

ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression whi ...

CVSS3: 7.5
github
почти 5 лет назад

Regular Expression Denial of Service (ReDoS) in ua-parser-js

CVSS3: 7.5
fstec
больше 4 лет назад

Уязвимость библиотеки ua-parser-js прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 50%
0.00266
Низкий

7.5 High

CVSS3