Miggo Logo

CVE-2021-34801: Denial of service in Valine

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.76536%
Published
6/21/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
valinenpm<= 1.4.14

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests when processing truncated User-Agent strings, suggesting the UA parsing logic fails to handle incomplete formats. While exact implementation details aren't available, the CWE-94 classification and issue reports indicate the system executes code based on UA input without proper validation. This would cause unhandled exceptions when parsing malformed UA strings, preventing comment loading. The medium confidence reflects the lack of direct code access, but the pattern matches common UA parsing vulnerabilities in client-side JS systems.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*lin* is * **st, simpl* & pow*r*ul *omm*nt syst*m. V*lin* *.*.** *llows r*mot* *tt**k*rs to **us* * **ni*l o* s*rvi** (*ppli**tion out***) *y supplyin* * u* (*k* Us*r-***nt) v*lu* t**t only sp**i*i*s t** pro*u*t *n* v*rsion.

Reasoning

T** vuln*r**ility m*ni**sts w**n pro**ssin* trun**t** Us*r-***nt strin*s, su***stin* t** U* p*rsin* lo*i* **ils to **n*l* in*ompl*t* *orm*ts. W*il* *x**t impl*m*nt*tion **t*ils *r*n't *v*il**l*, t** *W*-** *l*ssi*i**tion *n* issu* r*ports in*i**t* t*