Vulnerability Description
MooTools is a collection of JavaScript utilities for JavaScript developers. All known versions include a CSS selector parser that is vulnerable to Regular Expression Denial of Service (ReDoS). An attack requires that an attacker can inject a string into a CSS selector at runtime, which is quite common with e.g. jQuery CSS selectors. No patches are available for this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mootools | Mootools | <= 1.6.0 |
Related Weaknesses (CWE)
References
- https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/ExploitThird Party Advisory
- https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/ExploitThird Party Advisory
FAQ
What is CVE-2021-32821?
CVE-2021-32821 is a vulnerability with a CVSS score of 6.2 (MEDIUM). MooTools is a collection of JavaScript utilities for JavaScript developers. All known versions include a CSS selector parser that is vulnerable to Regular Expression Denial of Service (ReDoS). An atta...
How severe is CVE-2021-32821?
CVE-2021-32821 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32821?
Check the references section above for vendor advisories and patch information. Affected products include: Mootools Mootools.