First published: Wed Jan 13 2021(Updated: )
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation. The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service) This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen).
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/jQuery.Validation | <1.19.3 | 1.19.3 |
npm/jquery-validation | <1.19.3 | 1.19.3 |
JQuery Validation Plugin | <1.19.3 | |
NetApp SnapCenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21252 has a moderate severity level due to its potential for Regular Expression Denial of Service (ReDoS) attacks.
To fix CVE-2021-21252, upgrade to jQuery.Validation version 1.19.3 or later.
CVE-2021-21252 affects jQuery.Validation versions prior to 1.19.3, as well as related packages in npm and NuGet.
CVE-2021-21252 was reported by the GitHub Security Lab team aiming to raise awareness of vulnerabilities in jQuery.Validation.
CVE-2021-21252 is a Regular Expression Denial of Service (ReDoS) vulnerability.