CVE Vulnerabilities

CVE-2021-3749

Inefficient Regular Expression Complexity

Published: Aug 31, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.8 HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

axios is vulnerable to Inefficient Regular Expression Complexity

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
AxiosAxios*0.21.1 (including)
Migration Toolkit for Virtualization 2.2RedHatmigration-toolkit-virtualization/mtv-ui-rhel8:2.2.0-60*
OpenShift Service Mesh 2.0RedHatkiali-0:v1.24.7.redhat1-1.el8*
Red Hat Migration Toolkit for Containers 1.6RedHatrhmtc/openshift-migration-ui-rhel8:v1.6.0-24*
Red Hat OpenShift Container Platform 4.10RedHatopenshift4/ose-console:v4.10.0-202202240423.p0.gb6503ff.assembly.stream*
RHACS-3.67-RHEL-8RedHatadvanced-cluster-security/rhacs-rhel8-operator:3.67.0-3*
Node-axiosUbuntuesm-apps/focal*
Node-axiosUbuntufocal*
Node-axiosUbuntuhirsute*
Node-axiosUbuntuimpish*
Node-axiosUbuntukinetic*
Node-axiosUbuntulunar*
Node-axiosUbuntumantic*
Node-axiosUbuntuoracular*
Node-axiosUbuntuplucky*
Node-axiosUbuntutrusty*
Node-axiosUbuntuxenial*

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References