This repository has been archived by the owner on May 6, 2021. It is now read-only.
CVE-2021-27292 (Medium) detected in ua-parser-js-0.7.21.tgz #266
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-27292 - Medium Severity Vulnerability
Vulnerable Library - ua-parser-js-0.7.21.tgz
Lightweight JavaScript-based user-agent string parser
Library home page: https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.21.tgz
Path to dependency file: angular2-book-list/package.json
Path to vulnerable library: angular2-book-list/node_modules/ua-parser-js/package.json
Dependency Hierarchy:
Found in HEAD commit: c76ff3c3647e38a2276126ea9e1387a1e8b72f7f
Found in base branch: master
Vulnerability Details
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
Publish Date: 2021-03-17
URL: CVE-2021-27292
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://github.com/faisalman/ua-parser-js/releases/tag/0.7.24
Release Date: 2021-03-17
Fix Resolution: ua-parser-js - 0.7.24
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: