First published: Sun Jan 22 2023(Updated: )
A flaw was found in ua-parser-js. This issue could allow a malicious user to trigger a regular expression denial of service (ReDoS) via the trim() function.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Ua-parser-js Project Ua-parser-js | >=0.7.30<0.7.33 | |
Ua-parser-js Project Ua-parser-js | >=0.8.1<1.0.33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25927 is a vulnerability in the ua-parser-js package that allows a malicious user to trigger a regular expression denial of service (ReDoS) via the trim() function.
Versions of ua-parser-js from 0.7.30 up to, but not including, 0.7.33, and versions from 0.8.1 up to, but not including, 1.0.33 are affected by CVE-2022-25927.
CVE-2022-25927 has a severity score of 7.5, indicating a high severity vulnerability.
To fix CVE-2022-25927, upgrade ua-parser-js package to version 0.7.33 or higher for versions 0.7.x and to version 1.0.33 or higher for versions 0.8.x and later.
You can find more information about CVE-2022-25927 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2022-25927) and NIST NVD (https://nvd.nist.gov/vuln/detail/CVE-2022-25927).