Regular Expression Denial of Service (ReDoS) Affecting org.webjars.npm:jshamcrest package, versions (,)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Regular Expression Denial of Service (ReDoS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGWEBJARSNPM-479836
  • published6 Jan 2016
  • disclosed5 Jan 2016
  • creditAdam Baldwin

Introduced: 5 Jan 2016

CVE-2016-10521  (opens in a new tab)
CWE-400  (opens in a new tab)

Overview

jshamcrest's email address validator is vulnerable to regular expression denial of service (ReDoS) attack.

Details

"The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time." [1]

CVSS Scores

version 3.1