CVE-2021-27290
nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
ssri versión 5.2.2-8.0.0, corregido en versión 8.0.1, procesa los SRI usando una expresión regular que es vulnerable a una denegación de servicio. Los SRI maliciosos pueden tardar mucho en procesarse, conllevando a una denegación del servicio. Este problema solo afecta a consumidores que usan la opción estricta
A flaw was found in ssri package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS). This issue only affects consumers using the strict option. The highest threat from this vulnerability is to availability.
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include denial of service, information leakage, out of bounds read, path sanitization, and use-after-free vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-02-16 CVE Reserved
- 2021-03-12 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2025-04-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://npmjs.com | Product |
URL | Date | SRC |
---|---|---|
https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf | 2024-08-03 | |
https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | 2022-05-13 | |
https://www.oracle.com/security-alerts/cpuoct2021.html | 2022-05-13 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2021-27290 | 2021-09-22 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1941471 | 2021-09-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ssri Project Search vendor "Ssri Project" | Ssri Search vendor "Ssri Project" for product "Ssri" | >= 5.2.2 < 6.0.2 Search vendor "Ssri Project" for product "Ssri" and version " >= 5.2.2 < 6.0.2" | node.js |
Affected
| ||||||
Ssri Project Search vendor "Ssri Project" | Ssri Search vendor "Ssri Project" for product "Ssri" | >= 7.0.0 < 8.0.1 Search vendor "Ssri Project" for product "Ssri" and version " >= 7.0.0 < 8.0.1" | node.js |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 20.3.3 Search vendor "Oracle" for product "Graalvm" and version "20.3.3" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 21.2.0 Search vendor "Oracle" for product "Graalvm" and version "21.2.0" | enterprise |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sinec Infrastructure Network Services Search vendor "Siemens" for product "Sinec Infrastructure Network Services" | < 1.0.1.1 Search vendor "Siemens" for product "Sinec Infrastructure Network Services" and version " < 1.0.1.1" | - |
Affected
|