validator.js is vulnerable to Inefficient Regular Expression Complexity
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Validator | Validator_project | * | 13.7.0 (excluding) |
RHODF-4.12-RHEL-8 | RedHat | odf4/mcg-core-rhel8:v4.12.10-2 | * |
RHODF-4.13-RHEL-9 | RedHat | odf4/mcg-core-rhel9:v4.13.0-41 | * |
Validator.js | Ubuntu | bionic | * |
Validator.js | Ubuntu | trusty | * |
Validator.js | Ubuntu | xenial | * |
Attackers can create crafted inputs that
intentionally cause the regular expression to use
excessive backtracking in a way that causes the CPU
consumption to spike.