{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-21252","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","dateUpdated":"2024-08-03T18:09:14.663Z","dateReserved":"2020-12-22T00:00:00.000Z","datePublished":"2021-01-13T00:00:00.000Z"},"containers":{"cna":{"title":"Regular expression denial of service in jquery-validation","providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-08-31T02:06:47.919Z"},"descriptions":[{"lang":"en","value":"The jQuery Validation Plugin provides drop-in validation for your existing forms. It is published as an npm package \"jquery-validation\". jquery-validation before version 1.19.3 contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service). This is fixed in 1.19.3."}],"affected":[{"vendor":"jquery-validation","product":"jquery-validation","versions":[{"version":"< 1.19.3","status":"affected"}]}],"references":[{"url":"https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm"},{"url":"https://github.com/jquery-validation/jquery-validation/pull/2371"},{"url":"https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d"},{"url":"https://www.npmjs.com/package/jquery-validation"},{"url":"https://security.netapp.com/advisory/ntap-20210219-0005/"},{"name":"[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-400: Uncontrolled Resource Consumption","cweId":"CWE-400"}]}],"source":{"advisory":"GHSA-jxwx-85vp-gvwm","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T18:09:14.663Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm","tags":["x_transferred"]},{"url":"https://github.com/jquery-validation/jquery-validation/pull/2371","tags":["x_transferred"]},{"url":"https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d","tags":["x_transferred"]},{"url":"https://www.npmjs.com/package/jquery-validation","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20210219-0005/","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"}]}]}}