Description
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
Recommendation
Update the ua-parser-js
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 0.7.14, < 0.7.24
- Patched version(s): 0.7.24
References
Related Issues
- @digitalocean/do-markdownit has Type Confusion vulnerability - CVE-2025-59717
- node-opcua-alarm-condition prototype pollution vulnerability - CVE-2024-57086
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- axios Inefficient Regular Expression Complexity vulnerability - CVE-2021-3749
- Tags:
- npm
- ua-parser-js
Anything's wrong? Let us know Last updated on February 01, 2023