Miggo Logo

CVE-2020-7761:
Regular expression denial of service in @absolunet/kafe

5.3

CVSS Score

Basic Information

EPSS Score
-
Published
5/10/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
@absolunet/kafenpm< 3.2.103.2.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the email validation regex in validate.isEmail. The patch explicitly replaces this regex with a more secure implementation. This is the only function modified in the security fix commit, and it directly processes user input (email strings). During exploitation, this function would appear in profiler data as it would be stuck processing malicious input through the vulnerable regex.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T*is *****ts t** p**k*** @**solun*t/k*** ***or* *.*.**. It *llows **us* * **ni*l o* s*rvi** w**n v*li**tin* *r**t** inv*li* *m*ils.

Reasoning

T** vuln*r**ility st*ms *rom t** *m*il v*li**tion r***x in v*li**t*.is*m*il. T** p*t** *xpli*itly r*pl***s t*is r***x wit* * mor* s**ur* impl*m*nt*tion. T*is is t** only *un*tion mo*i*i** in t** s**urity *ix *ommit, *n* it *ir**tly pro**ss*s us*r inp