Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-5243
HistoryFeb 20, 2020 - 11:15 p.m.

CVE-2020-5243 Denial of Service in uap-core when processing crafted User-Agent strings

2020-02-2023:15:14
CWE-20
GitHub_M
www.cve.org
6

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

EPSS

0.003

Percentile

69.0%

uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. This has been patched in uap-core 0.7.3.

CNA Affected

[
  {
    "product": "uap-core",
    "vendor": "ua-parser",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.7.3"
      }
    ]
  }
]

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

EPSS

0.003

Percentile

69.0%