First published: Fri Mar 19 2021(Updated: )
Schema-Inspector is an open-source tool to sanitize and validate JS objects (npm package schema-inspector). In before version 2.0.0, email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schema-inspector Project Schema-inspector | <2.0.0 | |
Netapp E-series Performance Analyzer | ||
NetApp OnCommand Insight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21267 is a vulnerability in the Schema-Inspector open-source tool that allows for a denial-of-service attack through email address validation.
The severity of CVE-2021-21267 is high with a CVSS score of 7.5.
CVE-2021-21267 affects Schema-Inspector before version 2.0.0, making the email address validation vulnerable to a denial-of-service attack.
CVE-2021-21267 affects Schema-Inspector, NetApp E-series Performance Analyzer, and NetApp OnCommand Insight.
To fix CVE-2021-21267, upgrade Schema-Inspector to version 2.0.0 or later.