CVE-2021-32821

MooTools is a collection of JavaScript utilities for JavaScript developers. All known versions include a CSS selector parser that is vulnerable to Regular Expression Denial of Service (ReDoS). An attack requires that an attacker can inject a string into a CSS selector at runtime, which is quite common with e.g. jQuery CSS selectors. No patches are available for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mootools:mootools:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
Summary
  • (es) MooTools es una colección de utilidades de JavaScript para desarrolladores de JavaScript. Todas las versiones conocidas incluyen un analizador selector de CSS que es vulnerable a la denegación de servicio de expresión regular (ReDoS). Un ataque requiere que un atacante pueda inyectar una cadena en un selector CSS en tiempo de ejecución, lo cual es bastante común, por ejemplo, con los selectores CSS jQuery. No hay parches disponibles para este problema.
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 6.2
References () https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/ - Exploit, Third Party Advisory () https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/ - Exploit, Third Party Advisory

Information

Published : 2023-01-03 17:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32821

Mitre link : CVE-2021-32821

CVE.ORG link : CVE-2021-32821


JSON object : View

Products Affected

mootools

  • mootools
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1333

Inefficient Regular Expression Complexity