{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2020-26311","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2020-10-01T00:00:00.000Z","datePublished":"2024-10-26T20:26:35.087Z","dateUpdated":"2024-10-28T13:42:18.048Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"useragent","repo":"https://github.com/3rd-Eden/useragent","vendor":"3rd-Eden","versions":[{"status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">Useragent is a user agent parser for Node.js.</span> All versions as of time of publication&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">contain one or more regular expressions that are vulnerable to </span><span style=\"background-color: rgb(255, 255, 255);\">Regular Expression Denial of Service (ReDoS). As of time of publication, no patches are available.</span></span><br>"}],"value":"Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no patches are available."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"GREEN","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/U:Green","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1333","description":"CWE-1333 Inefficient Regular Expression Complexity","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-10-26T20:26:35.087Z"},"references":[{"url":"https://securitylab.github.com/advisories/GHSL-2020-312-redos-useragent/"},{"url":"https://github.com/3rd-Eden/useragent/issues/167"}],"source":{"advisory":"GHSL-2020-312","discovery":"UNKNOWN"},"title":"GHSL-2020-312: Regular Expression Denial of Service (ReDoS) in useragent","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"useragent_project","product":"useragent","cpes":["cpe:2.3:a:useragent_project:useragent:*:*:*:*:*:node.js:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-28T13:37:14.956695Z","id":"CVE-2020-26311","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-28T13:42:18.048Z"}}]}}