We found results for “”
WS-2020-0097
Good to know:
Date: May 19, 2020
papaparse before 5.5.2 are vulnerable to Regular Expression Denial of Service (ReDos). The parse function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
Language: Java
Severity Score
Severity Score
Weakness Type (CWE)
Incorrect Regular Expression
CWE-185Top Fix
Upgrade Version
Upgrade to version auspice - 2.37.1;aheinze/cockpit - no_fix;aheinze/cockpit - 0.11.3;aheinze/cockpit - 0.4.4;aheinze/cockpit - 0.9.4;aheinze/cockpit - 0.7.3;aheinze/cockpit - 0.13.0;piotr-cz/cockpit-import - no_fix;piotr-cz/cockpit-import - v1.0.0-rc.1;genenotebook - 0.3.0;papaparse - 5.2.0;markdrzy/importable - v1.0.0;markdrzy/importable - v1.0.1;org.webjars.bowergithub.mholt:papaparse:no_fix;org.webjars.bower:papaparse:no_fix;org.webjars:papa-parse:no_fix;org.webjars.npm:papaparse:5.2.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


