First published: Fri Sep 17 2021(Updated: )
A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
npm/ansi-regex | >=3.0.0<3.0.1 | 3.0.1 |
npm/ansi-regex | >=4.0.0<4.1.1 | 4.1.1 |
npm/ansi-regex | >=5.0.0<5.0.1 | 5.0.1 |
npm/ansi-regex | >=6.0.0<6.0.1 | 6.0.1 |
redhat/nodejs-nodemon | <0:2.0.19-1.el9_0 | 0:2.0.19-1.el9_0 |
redhat/rh-nodejs14-nodejs | <0:14.18.2-1.el7 | 0:14.18.2-1.el7 |
redhat/rh-nodejs14-nodejs-nodemon | <0:2.0.3-6.el7 | 0:2.0.3-6.el7 |
redhat/ovirt-engine-ui-extensions | <0:1.3.3-1.el8e | 0:1.3.3-1.el8e |
redhat/ovirt-web-ui | <0:1.9.0-1.el8e | 0:1.9.0-1.el8e |
redhat/nodejs-ansi-regex | <6.0.1 | 6.0.1 |
redhat/nodejs-ansi-regex | <5.0.1 | 5.0.1 |
Ansi-regex Project Ansi-regex | >=4.0.0<4.1.1 | |
Ansi-regex Project Ansi-regex | =3.0.0 | |
Ansi-regex Project Ansi-regex | =5.0.0 | |
Ansi-regex Project Ansi-regex | =6.0.0 | |
Oracle Communications Cloud Native Core Policy | =1.15.0 | |
IBM Cognos Analytics 11.2.x | <=IBM Cognos Analytics 11.2.x | |
IBM Cognos Analytics 11.1.x | <=IBM Cognos Analytics 11.1.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3807 is a vulnerability in ansi-regex that allows for inefficient regular expression complexity, leading to a denial of service when parsing invalid ANSI escape codes.
The severity of CVE-2021-3807 is high, with a CVSS score of 7.5.
The affected software includes ansi-regex versions 3.0.0 to 3.0.1, 4.0.0 to 4.1.1, 5.0.0 to 5.0.1, and 6.0.0 to 6.0.1, as well as other packages and products mentioned in the vulnerability description.
To fix the vulnerability, upgrade ansi-regex to version 3.0.1, 4.1.1, 5.0.1, or 6.0.1, depending on your current version. Make sure to also update any other affected packages or products mentioned in the vulnerability description.
You can find more information about CVE-2021-3807 on the NIST National Vulnerability Database (NVD) website and the GitHub page for chalk/ansi-regex.