5.3 CVE-2022-25844

Exploit
 

The package angular after 1.7.0 are vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **Note:** 1) This package has been deprecated and is no longer maintained. 2) The vulnerable versions are 1.7.0 and higher.
https://nvd.nist.gov/vuln/detail/CVE-2022-25844

Categories

CWE-1333 : Inefficient Regular Expression Complexity
Some regular expression engines have a feature called "backtracking". If the token cannot match, the engine "backtracks" to a position that may result in a different token that can match.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:angularjs:angularjs:*:*:*:*:*:*:*:* >= 1.7.0
Configuration 2
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
Configuration 3
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737
https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735
https://stackblitz.com/edit/angularjs-material-blank-zvtdvb
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737
https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735
https://stackblitz.com/edit/angularjs-material-blank-zvtdvb


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
492 Regular Expression Exponential Blowup