cve/2022/CVE-2022-25927.md

27 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25927)
![](https://img.shields.io/static/v1?label=Product&message=ua-parser-js&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200.7.30%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen)
### Description
Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function.
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/OneIdentity/IdentityManager.Imx
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/masahiro331/cve-2022-25927
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/seal-community/patches
- https://github.com/trong0dn/eth-todo-list
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC