A vulnerability was found in Woorank robots-txt-guard. It has been rated as problematic. Affected by this issue is the function makePathPattern of the file lib/patterns.js. The manipulation of the argument pattern leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The name of the patch is c03827cd2f9933619c23894ce7c98401ea824020. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217448.
References
Link | Resource |
---|---|
https://github.com/Woorank/robots-txt-guard/commit/c03827cd2f9933619c23894ce7c98401ea824020 | Patch Third Party Advisory |
https://github.com/Woorank/robots-txt-guard/pull/4 | Patch Third Party Advisory |
https://vuldb.com/?ctiid.217448 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.217448 | Third Party Advisory |
Configurations
History
11 Apr 2024, 01:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
Information
Published : 2023-01-05 11:15
Updated : 2024-05-17 02:03
NVD link : CVE-2021-4305
Mitre link : CVE-2021-4305
CVE.ORG link : CVE-2021-4305
JSON object : View
Products Affected
bridgeline
- robots-txt-guard
CWE
CWE-1333
Inefficient Regular Expression Complexity