The jQuery Validation Plugin provides drop-in validation for your existing forms. It is published as an npm package "jquery-validation". jquery-validation before version 1.19.3 contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service). This is fixed in 1.19.3.
References
Configurations
History
21 Nov 2024, 05:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
References | () https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d - Patch, Third Party Advisory | |
References | () https://github.com/jquery-validation/jquery-validation/pull/2371 - Patch, Third Party Advisory | |
References | () https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html - | |
References | () https://security.netapp.com/advisory/ntap-20210219-0005/ - Third Party Advisory | |
References | () https://www.npmjs.com/package/jquery-validation - Product, Third Party Advisory |
Information
Published : 2021-01-13 19:15
Updated : 2024-11-21 05:47
NVD link : CVE-2021-21252
Mitre link : CVE-2021-21252
CVE.ORG link : CVE-2021-21252
JSON object : View
Products Affected
jqueryvalidation
- jquery_validation
netapp
- snapcenter
CWE
CWE-400
Uncontrolled Resource Consumption