Vulnerability Description
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Parse-Link-Header Project | Parse-Link-Header | < 2.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf30PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973ExploitPatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783ExploitPatchThird Party Advisory
- https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf30PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973ExploitPatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783ExploitPatchThird Party Advisory
FAQ
What is CVE-2021-23490?
CVE-2021-23490 is a vulnerability with a CVSS score of 7.5 (HIGH). The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
How severe is CVE-2021-23490?
CVE-2021-23490 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-23490?
Check the references section above for vendor advisories and patch information. Affected products include: Parse-Link-Header Project Parse-Link-Header.