CVE-2020-1920: Regular expression denial of service in react-native
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62511%
CWE
Published
7/20/2021
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
react-native | npm | >= 0.59.0, < 0.62.3 | 0.62.3 |
react-native | npm | >= 0.63.0, < 0.64.1 | 0.64.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The commit diff shows direct modification of the validateBaseUrl regex pattern in URL.js
- Security advisories explicitly reference validateBaseUrl as the vulnerable function
- The CWE-400 (Uncontrolled Resource Consumption) maps directly to ReDoS impacts
- Multiple independent sources (GitHub Advisory, NVD, and Facebook's patch notes) converge on this function
- The regex pattern shown in pre-patch code matches known ReDoS vulnerability patterns with nested quantifiers and ambiguous alternations