cve/2020/CVE-2020-7661.md

34 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-7661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7661)
![](https://img.shields.io/static/v1?label=Product&message=url-regex&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service&color=brighgreen)
### Description
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
### POC
#### Reference
- https://snyk.io/vuln/SNYK-JS-URLREGEX-569472
2024-06-09 00:33:16 +00:00
- https://snyk.io/vuln/SNYK-JS-URLREGEX-569472
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NoodleOfDeath/social-bio-bot
- https://github.com/Pietruszka69/dddd
- https://github.com/beehunt9r/instagram-private-api
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dilame/instagram-private-api
- https://github.com/engn33r/awesome-redos-security
- https://github.com/haxzie/streamon-instagram-private-api
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ocavue/url-regex-unsafe
- https://github.com/remygin/ipa
- https://github.com/soosmile/POC
- https://github.com/spamscanner/url-regex-safe
- https://github.com/wdwdwd01/ipa