ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-0991 | ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time. |
![]() |
GHSA-78cj-fxph-m83p | Regular Expression Denial of Service (ReDoS) in ua-parser-js |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:48:16.474Z
Reserved: 2021-02-16T00:00:00
Link: CVE-2021-27292

No data.

Status : Modified
Published: 2021-03-17T13:15:15.200
Modified: 2024-11-21T05:57:45.830
Link: CVE-2021-27292


No data.