{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-4305","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-05T10:01:45.732Z","datePublished":"2023-01-05T10:03:09.193Z","dateUpdated":"2024-11-25T17:49:33.996Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T13:39:32.498Z"},"title":"Woorank robots-txt-guard patterns.js makePathPattern redos","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1333","lang":"en","description":"CWE-1333 Inefficient Regular Expression Complexity"}]}],"affected":[{"vendor":"Woorank","product":"robots-txt-guard","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Woorank robots-txt-guard. It has been rated as problematic. Affected by this issue is the function makePathPattern of the file lib/patterns.js. The manipulation of the argument pattern leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The name of the patch is c03827cd2f9933619c23894ce7c98401ea824020. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217448."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in Woorank robots-txt-guard ausgemacht. Betroffen davon ist die Funktion makePathPattern der Datei lib/patterns.js. Dank der Manipulation des Arguments pattern mit unbekannten Daten kann eine inefficient regular expression complexity-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als c03827cd2f9933619c23894ce7c98401ea824020 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.3,"vectorString":"AV:A/AC:M/Au:S/C:N/I:N/A:P"}}],"timeline":[{"time":"2023-01-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-05T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-28T15:36:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217448","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217448","tags":["signature","permissions-required"]},{"url":"https://github.com/Woorank/robots-txt-guard/pull/4","tags":["exploit","issue-tracking"]},{"url":"https://github.com/Woorank/robots-txt-guard/commit/c03827cd2f9933619c23894ce7c98401ea824020","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:23:10.568Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217448","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217448","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/Woorank/robots-txt-guard/pull/4","tags":["exploit","issue-tracking","x_transferred"]},{"url":"https://github.com/Woorank/robots-txt-guard/commit/c03827cd2f9933619c23894ce7c98401ea824020","tags":["patch","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-25T17:49:23.236965Z","id":"CVE-2021-4305","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-25T17:49:33.996Z"}}]}}