Miggo Logo

CVE-2021-43306: Regular expression denial of service in jquery-validation

N/A

CVSS Score

Basic Information

EPSS Score
0.77972%
Published
6/3/2022
Updated
11/12/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
jquery-validationnpm< 1.19.41.19.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The url2 method is identified as vulnerable because the patch directly modifies the regular expression used within this method to mitigate the ReDoS vulnerability. The method is responsible for validating URLs and is directly exposed to user input, making it the primary point of vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n *xpon*nti*l R**oS (R**ul*r *xpr*ssion **ni*l o* S*rvi**) **n ** tri***r** in t** jqu*ry-v*li**tion npm p**k***, w**n *n *tt**k*r is **l* to supply *r*itr*ry input to t** url* m*t*o*

Reasoning

T** url* m*t*o* is i**nti*i** *s vuln*r**l* ****us* t** p*t** *ir**tly mo*i*i*s t** r**ul*r *xpr*ssion us** wit*in t*is m*t*o* to miti**t* t** R**oS vuln*r**ility. T** m*t*o* is r*sponsi*l* *or v*li**tin* URLs *n* is *ir**tly *xpos** to us*r input, m