
Cloud Vulnerability DB
A community-led vulnerabilities database
Useragent, a user agent parser for Node.js, contains a vulnerability identified as CVE-2020-26311. The vulnerability affects all versions of the software as of the publication date and involves one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). The issue was discovered by the GitHub Security Lab team and reported on November 30, 2020 (GitHub Issue, NVD).
The vulnerability stems from inefficient regular expressions that can lead to excessive backtracking under specific input patterns. One of the vulnerable regular expressions identified was: /(HbbTV)/1.1.1.CE-HTML/1.\d;(Vendor/)(THOM;?);\s(LF;+);?/. When provided with specially crafted input, this regular expression can cause exponential backtracking, resulting in O(2^n) runtime performance (GitHub Advisory).
The vulnerability can lead to a Denial of Service (DoS) condition when processing maliciously crafted user agent strings. Since useragent is designed to handle untrusted user inputs on the server side, this vulnerability could allow attackers to cause significant server-side performance degradation through carefully constructed HTTP requests (GitHub Advisory).
At the time of publication, no official patches were available for this vulnerability. While a fix exists in the master branch of the repository, it had not been published to npm, with the latest published version being three years old (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."