Description
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14
Exploit, Third Party Advisory x_refsource_misc
https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76
Patch, Third Party Advisory x_refsource_misc
https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566
Scores
CVSS v3
7.5
EPSS
0.0027
EPSS Percentile
50.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
Status
published
Products (2)
npm/ua-parser-js
0.7.14 - 0.7.24npm
ua-parser-js_project/ua-parser-js
0.7.14 - 0.7.24
Published
Mar 17, 2021
Tracked Since
Feb 18, 2026