CVE Vulnerabilities

CVE-2021-3807

Inefficient Regular Expression Complexity

Published: Sep 17, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.8 HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

ansi-regex is vulnerable to Inefficient Regular Expression Complexity

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
Ansi-regexAnsi-regex_project4.0.0 (including)4.1.1 (excluding)
Ansi-regexAnsi-regex_project3.0.0 (including)3.0.0 (including)
Ansi-regexAnsi-regex_project5.0.0 (including)5.0.0 (including)
Ansi-regexAnsi-regex_project6.0.0 (including)6.0.0 (including)
Red Hat Enterprise Linux 8RedHatnodejs:16-8050020211206113934.c5368500*
Red Hat Enterprise Linux 8RedHatnodejs:14-8050020211213115342.c5368500*
Red Hat Enterprise Linux 8RedHatnodejs:16-8060020220805104227.ad008a3a*
Red Hat Enterprise Linux 8.4 Extended Update SupportRedHatnodejs:14-8040020211213111158.522a0ee4*
Red Hat Enterprise Linux 9RedHatnodejs-nodemon-0:2.0.19-1.el9_0*
Red Hat Fuse 7.11RedHatio.hawt-hawtio-online*
Red Hat Fuse 7.11RedHatio.hawt-project*
Red Hat Migration Toolkit for Containers 1.6RedHatrhmtc/openshift-migration-ui-rhel8:v1.6.5-8*
Red Hat Migration Toolkit for Containers 1.7RedHatrhmtc/openshift-migration-ui-rhel8:v1.7.2-9*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs14-nodejs-0:14.18.2-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7*
Red Hat Virtualization Engine 4.4RedHatovirt-engine-ui-extensions-0:1.3.3-1.el8ev*
Red Hat Virtualization Engine 4.4RedHatovirt-web-ui-0:1.9.0-1.el8ev*
RHODF-4.13-RHEL-9RedHatodf4/mcg-core-rhel9:v4.13.0-41*
Node-ansi-regexUbuntubionic*
Node-ansi-regexUbuntufocal*
Node-ansi-regexUbuntuhirsute*
Node-ansi-regexUbuntuimpish*
Node-ansi-regexUbuntukinetic*
Node-ansi-regexUbuntulunar*
Node-ansi-regexUbuntumantic*
Node-ansi-regexUbuntuoracular*
Node-ansi-regexUbuntuplucky*
Node-ansi-regexUbuntutrusty*
Node-ansi-regexUbuntuxenial*

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References