Vulnerability Description
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Npmjs | Npm-User-Validate | < 1.0.1 |
References
- https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a866PatchThird Party Advisory
- https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479pThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352ExploitThird Party Advisory
- https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a866PatchThird Party Advisory
- https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479pThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352ExploitThird Party Advisory
FAQ
What is CVE-2020-7754?
CVE-2020-7754 is a vulnerability with a CVSS score of 7.5 (HIGH). This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
How severe is CVE-2020-7754?
CVE-2020-7754 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7754?
Check the references section above for vendor advisories and patch information. Affected products include: Npmjs Npm-User-Validate.