Denial of Service in uap-core
Description
Reviewed
Feb 1, 2021
Published to the GitHub Advisory Database
Feb 2, 2021
Published by the National Vulnerability Database
Feb 16, 2021
Last updated
Feb 8, 2024
Impact
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
Patches
Please update uap-core to >= v0.11.0
Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
References