Description
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
Remediation
References
https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76
https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566
https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14
Related Vulnerabilities
CVE-2022-22984 Vulnerability in npm package snyk-docker-plugin
CVE-2022-43417 Vulnerability in maven package org.jenkins-ci.plugins:katalon
CVE-2022-29770 Vulnerability in maven package com.xuxueli:xxl-job
CVE-2020-2210 Vulnerability in maven package org.jenkins-ci.plugins:stashbranchparameter
CVE-2020-1951 Vulnerability in maven package org.apache.tika:tika-parsers