Lucene search

K
githubGitHub Advisory DatabaseGHSA-PVRW-G6FX-MCX2
HistoryJul 06, 2023 - 7:24 p.m.

is_js vulnerable to Regular Expression Denial of Service

2023-07-0619:24:05
CWE-400
CWE-1333
GitHub Advisory Database
github.com
40
is.js
vulnerability
redos
regex
url validation
codeql
no patch

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

38.2%

is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever.” This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue.

Affected configurations

Vulners
Node
is_jsRange0.9.0
VendorProductVersionCPE
*is_js*cpe:2.3:a:*:is_js:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

38.2%

Related for GHSA-PVRW-G6FX-MCX2