CVE-2022-25927
Published on: Not Yet Published
Last Modified on: 02/02/2023 06:26:00 PM UTC
Certain versions of Ua-parser-js from Ua-parser-js Project contain the following vulnerability:
Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function.
- CVE-2022-25927 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Regular Expression Denial of Service (ReDoS) in ua-parser-js | CVE-2022-25927 | Snyk | security.snyk.io text/html |
![]() |
Remove unsafe regex in trim() function · faisalman/[email protected] · GitHub | github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Ua-parser-js Project | Ua-parser-js | All | All | All | All |
- cpe:2.3:a:ua-parser-js_project:ua-parser-js:*:*:*:*:*:node.js:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|