Lucene search

K
cve[email protected]CVE-2020-26302
HistoryDec 22, 2022 - 9:15 p.m.

CVE-2020-26302

2022-12-2221:15:08
CWE-400
CWE-1333
web.nvd.nist.gov
21
is.js
vulnerability
cve-2020-26302
redos
regex loop
nvd
codeql

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.4%

is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop β€œforever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue.

Affected configurations

Vulners
NVD
Node
arasatasayginis.jsRange≀0.9.0

CNA Affected

[
  {
    "vendor": "arasatasaygin",
    "product": "is.js",
    "versions": [
      {
        "version": "0.9.0",
        "status": "affected",
        "lessThanOrEqual": "0.9.0",
        "versionType": "custom"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.4%

Related for CVE-2020-26302