Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12dmYyLXBwajktcHA0Oc0VyA
Inefficient Regular Expression Complexity in vuelidate
vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the @vuelidate/validators
package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12dmYyLXBwajktcHA0Oc0VyA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: over 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-vvf2-ppj9-pp49, CVE-2021-3794
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-3794
- https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d
- https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7
- https://github.com/advisories/GHSA-vvf2-ppj9-pp49
Blast Radius: 23.7
Affected Packages
npm:@vuelidate/validators
Dependent packages: 163Dependent repositories: 1,464
Downloads: 856,142 last month
Affected Version Ranges: <= 2.0.0-alpha.21
Fixed in: 2.0.0-alpha.22
All affected versions: 2.0.0-alpha.0, 2.0.0-alpha.1, 2.0.0-alpha.2, 2.0.0-alpha.3, 2.0.0-alpha.4, 2.0.0-alpha.5, 2.0.0-alpha.6, 2.0.0-alpha.7, 2.0.0-alpha.8, 2.0.0-alpha.9, 2.0.0-alpha.10, 2.0.0-alpha.11, 2.0.0-alpha.12, 2.0.0-alpha.13, 2.0.0-alpha.14, 2.0.0-alpha.15, 2.0.0-alpha.16, 2.0.0-alpha.17, 2.0.0-alpha.18, 2.0.0-alpha.19, 2.0.0-alpha.20, 2.0.0-alpha.21
All unaffected versions: 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4