CVE Vulnerabilities

CVE-2020-5243

Inefficient Regular Expression Complexity

Published: Feb 21, 2020 | Modified: Feb 08, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. This has been patched in uap-core 0.7.3.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

Name Vendor Start Version End Version
Uap-core Uap-core_project * 0.7.3 (excluding)
Uap-core Ubuntu devel *
Uap-core Ubuntu eoan *
Uap-core Ubuntu esm-apps/focal *
Uap-core Ubuntu esm-apps/jammy *
Uap-core Ubuntu esm-apps/noble *
Uap-core Ubuntu focal *
Uap-core Ubuntu groovy *
Uap-core Ubuntu hirsute *
Uap-core Ubuntu impish *
Uap-core Ubuntu jammy *
Uap-core Ubuntu kinetic *
Uap-core Ubuntu lunar *
Uap-core Ubuntu mantic *
Uap-core Ubuntu noble *
Uap-core Ubuntu oracular *
Uap-core Ubuntu trusty *

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References