First published: Thu Jul 14 2022(Updated: )
The jQuery Validation Plugin (jquery-validation) provides drop-in validation for forms. Versions of jquery-validation prior to 1.19.5 are vulnerable to regular expression denial of service (ReDoS) when an attacker is able to supply arbitrary input to the url2 method. This is due to an incomplete fix for CVE-2021-43306. Users should upgrade to version 1.19.5 to receive a patch.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jqueryvalidation Jquery Validation | <1.19.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31147 is a vulnerability in the jQuery Validation Plugin (jquery-validation) that allows for regular expression denial of service (ReDoS) when arbitrary input is supplied to the url2 method.
CVE-2022-31147 has a severity rating of 7.5 (High).
CVE-2022-31147 affects versions of jquery-validation prior to 1.19.5, specifically the Jqueryvalidation Jquery Validation library.
To fix CVE-2022-31147, upgrade to version 1.19.5 or later of the jquery-validation library.
You can find more information about CVE-2022-31147 on the GitHub page for the jquery-validation library, including the commit and release that address the vulnerability, as well as the security advisory.