Description
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
Recommendation
Update the ua-parser-js package to the latest compatible version. Followings are version details:
- Affected version(s): >= 0.7.14, < 0.7.24
- Patched version(s): 0.7.24
References
Related Issues
- ReDoS Vulnerability in ua-parser-js version - CVE-2022-25927
- useragent Regular Expression Denial of Service vulnerability - CVE-2020-26311
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- node-opcua-alarm-condition prototype pollution vulnerability - CVE-2024-57086
- Tags:
- npm
- ua-parser-js
Anything's wrong? Let us know Last updated on February 01, 2023