Miggo Logo

CVE-2018-25049:
email-existence Inefficient Regular Expression Complexity vulnerability

7.5

CVSS Score

Basic Information

EPSS Score
-
Published
12/27/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
email-existencenpm<= 0.1.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the regex-based email validation in index.js. The commit diff shows the regex /^\S+@\S+$/ was used without input length validation, making it vulnerable to REDOS via long emails. The patch adds a 300-character limit before regex validation, confirming the original function's regex was the attack vector. The exported email validation function is the primary entry point for this check, making it the clear vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility w*s *oun* in *m*il-*xist*n**. It **s ***n r*t** *s pro*l*m*ti*. *****t** *y t*is issu* is som* unknown *un*tion*lity o* t** *il* `in**x.js`. T** m*nipul*tion l***s to in***i*i*nt r**ul*r *xpr*ssion *ompl*xity. T** n*m* o* t** p*t** is

Reasoning

T** vuln*r**ility st*ms *rom t** r***x-**s** *m*il v*li**tion in in**x.js. T** *ommit *i** s*ows t** r***x /^\S+@\S+$/ w*s us** wit*out input l*n*t* v*li**tion, m*kin* it vuln*r**l* to R**OS vi* lon* *m*ils. T** p*t** ***s * ***-***r**t*r limit ***or