Moderate severityNVD Advisory· Published Jun 4, 2018· Updated Sep 17, 2024
CVE-2017-16021
CVE-2017-16021
Description
uri-js is a module that tries to fully implement RFC 3986. One of these features is validating whether or not a supplied URL is valid or not. To do this, uri-js uses a regular expression, This regular expression is vulnerable to redos. This causes the program to hang and the CPU to idle at 100% usage while uri-js is trying to validate if the supplied URL is valid or not. To check if you're vulnerable, look for a call to require("uri-js").parse() where a user is able to send their own input. This affects uri-js 2.1.1 and earlier.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
uri-jsnpm | < 3.0.0 | 3.0.0 |
Affected products
1- Range: <=2.1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-333w-rxj3-f55rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-16021ghsaADVISORY
- github.com/garycourt/uri-js/issues/12ghsax_refsource_MISCWEB
- nodesecurity.io/advisories/100ghsax_refsource_MISCWEB
- www.npmjs.com/advisories/100ghsaWEB
News mentions
0No linked articles in our index yet.