7.5

CVE-2021-43307

Exploit

semver-regex <= 3.1.3 and 4.0.0-4.0.3 - Regular Expression Denial of Service (ReDoS)

An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the semver-regex npm package, when an attacker is able to supply arbitrary input to the test() method
Mögliche Gegenmaßnahme
Insert Special Characters: Update to version 1.0.5, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Insert Special Characters
Version *-1.0.4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Semver-regex ProjectSemver-regex Version < 3.1.4
Semver-regex ProjectSemver-regex Version >= 4.0.0 < 4.0.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.31% 0.54
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
reefs@jfrog.com 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-1333 Inefficient Regular Expression Complexity

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.