
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-5243 is a vulnerability affecting uap-core versions <=0.7.2, discovered and disclosed in February 2020. The vulnerability involves regular expression denial of service (REDoS) due to overlapping capture groups in the user agent parser. This affects systems that process User-Agent strings using the uap-core library (GitHub Advisory).
The vulnerability stems from multiple regular expressions containing overlapping capture groups that cause excessive backtracking, resulting in approximately cubic time complexity with respect to the length of the user-agent string. Four specific regex patterns were identified as vulnerable, including patterns for parsing SmartWatch, Huawei devices, and HbbTV user agents. The vulnerability was assigned a High severity rating (GitHub Advisory).
This vulnerability allows remote attackers to cause denial of service by overloading servers through sending HTTP(S) requests with maliciously crafted long strings in the User-Agent header. The processing of these strings can lead to excessive CPU consumption due to the inefficient regular expression matching (GitHub Advisory).
The vulnerability was patched in uap-core version 0.7.3. Users should update to this version or later to mitigate the issue. It's worth noting that downstream packages such as uap-python and uap-ruby which depend on uap-core follow different version schemes and should be updated accordingly (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."