| |
Vulnerability CVE-2017-16021
Published: 2018-06-04
Description: |
uri-js is a module that tries to fully implement RFC 3986. One of these features is validating whether or not a supplied URL is valid or not. To do this, uri-js uses a regular expression, This regular expression is vulnerable to redos. This causes the program to hang and the CPU to idle at 100% usage while uri-js is trying to validate if the supplied URL is valid or not. To check if you're vulnerable, look for a call to `require("uri-js").parse()` where a user is able to send their own input. This affects uri-js 2.1.1 and earlier. |
Type:
CWE-400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
6.8/10 |
6.9/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
None |
Complete |
References: |
https://github.com/garycourt/uri-js/issues/12
https://nodesecurity.io/advisories/100
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|