CVE-2020-26302

is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:is.js_project:is.js:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
Summary
  • (es) is.js es una librería de verificación de uso general. Las versiones 0.9.0 y anteriores contienen una o más expresiones regulares que son vulnerables a la denegación de servicio de expresión regular (ReDoS). is.js utiliza una expresión regular copiada y pegada de una esencia para validar las URL. Intentar validar una cadena maliciosa puede hacer que la expresión regular se repita "forever". Esta vulnerabilidad se encontró mediante una consulta CodeQL que identifica expresiones regulares ineficientes. is.js no tiene ningún parche para este problema.
References () https://github.com/arasatasaygin/is.js/issues/320 - Issue Tracking, Third Party Advisory () https://github.com/arasatasaygin/is.js/issues/320 - Issue Tracking, Third Party Advisory
References () https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js - Exploit, Third Party Advisory () https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js - Exploit, Third Party Advisory

Information

Published : 2022-12-22 21:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26302

Mitre link : CVE-2020-26302

CVE.ORG link : CVE-2020-26302


JSON object : View

Products Affected

is.js_project

  • is.js
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1333

Inefficient Regular Expression Complexity