CVE-2021-27290
nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
ssri versión 5.2.2-8.0.0, corregido en versión 8.0.1, procesa los SRI usando una expresión regular que es vulnerable a una denegación de servicio. Los SRI maliciosos pueden tardar mucho en procesarse, conllevando a una denegación del servicio. Este problema solo afecta a consumidores que usan la opción estricta
A flaw was found in ssri package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS). This issue only affects consumers
using the strict option. The highest threat from this vulnerability is to availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-02-16 CVE Reserved
- 2021-03-12 CVE Published
- 2023-11-26 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://npmjs.com | Product |
URL | Date | SRC |
---|---|---|
https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf | 2024-08-03 | |
https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | 2022-05-13 | |
https://www.oracle.com/security-alerts/cpuoct2021.html | 2022-05-13 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2021-27290 | 2021-09-22 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1941471 | 2021-09-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ssri Project Search vendor "Ssri Project" | Ssri Search vendor "Ssri Project" for product "Ssri" | >= 5.2.2 < 6.0.2 Search vendor "Ssri Project" for product "Ssri" and version " >= 5.2.2 < 6.0.2" | node.js |
Affected
| ||||||
Ssri Project Search vendor "Ssri Project" | Ssri Search vendor "Ssri Project" for product "Ssri" | >= 7.0.0 < 8.0.1 Search vendor "Ssri Project" for product "Ssri" and version " >= 7.0.0 < 8.0.1" | node.js |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 20.3.3 Search vendor "Oracle" for product "Graalvm" and version "20.3.3" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 21.2.0 Search vendor "Oracle" for product "Graalvm" and version "21.2.0" | enterprise |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sinec Infrastructure Network Services Search vendor "Siemens" for product "Sinec Infrastructure Network Services" | < 1.0.1.1 Search vendor "Siemens" for product "Sinec Infrastructure Network Services" and version " < 1.0.1.1" | - |
Affected
|