Vulnerability Description
is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Is.Js Project | Is.Js | <= 0.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/arasatasaygin/is.js/issues/320Issue TrackingThird Party Advisory
- https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.jsExploitThird Party Advisory
- https://github.com/arasatasaygin/is.js/issues/320Issue TrackingThird Party Advisory
- https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.jsExploitThird Party Advisory
FAQ
What is CVE-2020-26302?
CVE-2020-26302 is a vulnerability with a CVSS score of 7.5 (HIGH). is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-...
How severe is CVE-2020-26302?
CVE-2020-26302 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-26302?
Check the references section above for vendor advisories and patch information. Affected products include: Is.Js Project Is.Js.