You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A few things were changed as per the PR comments:
1) The module title was reworded
2) The module description was multi-lined
3) Negative logic was rewritten to use 'unless'
4) Strings which did not require interpolation were rewritten
5) Documentation markdown was added.
Copy file name to clipboardExpand all lines: modules/auxiliary/dos/http/ua_parser_js_redos.rb
+15-10Lines changed: 15 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -9,12 +9,17 @@ class MetasploitModule < Msf::Auxiliary
9
9
10
10
definitialize
11
11
super(
12
-
'Name'=>'ua-parser-js npm module - Regular Expression Denial of Service',
12
+
'Name'=>'ua-parser-js npm module ReDoS',
13
13
'Description'=>%q{
14
-
This module exploits a Regular Expression Denial of Service vulnerability in the npm module "ua-parser-js". Server-side applications that use "ua-parser-js" for parsing the browser user-agent string will be vulnerable if they call the "getOS" or "getResult" functions. This vulnerability was fixed as of version 0.7.16.
14
+
This module exploits a Regular Expression Denial of Service vulnerability
15
+
in the npm module "ua-parser-js". Server-side applications that use
16
+
"ua-parser-js" for parsing the browser user-agent string will be vulnerable
17
+
if they call the "getOS" or "getResult" functions. This vulnerability was
0 commit comments