Vulnerability Name: | CVE-2021-21252 (CCN-194982) | ||||||||||||
Assigned: | 2020-12-22 | ||||||||||||
Published: | 2021-01-09 | ||||||||||||
Updated: | 2021-02-19 | ||||||||||||
Summary: | The jQuery Validation Plugin provides drop-in validation for your existing forms. It is published as an npm package "jquery-validation". jquery-validation before version 1.19.3 contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service). This is fixed in 1.19.3. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-400 CWE-400 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-21252 Source: XF Type: UNKNOWN jquery-cve202121252-dos(194982) Source: MISC Type: Patch, Third Party Advisory https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d Source: MISC Type: Patch, Third Party Advisory https://github.com/jquery-validation/jquery-validation/pull/2371 Source: CCN Type: jQuery Validation GIT Repository GH Reported Security issue Source: CONFIRM Type: Third Party Advisory https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210219-0005/ Source: CCN Type: IBM Security Bulletin 6966412 (Engineering Workflow Management) IBM Engineering Workflow Management (EWM) vulnerability CVE-2021-21252 Source: CCN Type: NPM Web site jquery-validation Source: MISC Type: Product, Third Party Advisory https://www.npmjs.com/package/jquery-validation | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |