Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. ua-parser-js
  4. ›
  5. GMS-2023-120

GMS-2023-120: Duplicate of ./npm/ua-parser-js/CVE-2022-25927.yml

January 24, 2023

Description:

A regular expression denial of service (ReDoS) vulnerability has been discovered in ua-parser-js.

Impact:

This vulnerability bypass the library’s MAX_LENGTH input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.

Affected Versions:

All versions of the library prior to version 0.7.33 / 1.0.33.

Patches:

A patch has been released to remove the vulnerable regular expression, update to version 0.7.33 / 1.0.33 or later.

References:

Regular expression Denial of Service - ReDoS

Credits:

Thanks to @Snyk who first reported the issue.

References

  • github.com/advisories/GHSA-fhg7-m89q-25r3
  • github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411
  • github.com/faisalman/ua-parser-js/security/advisories/GHSA-fhg7-m89q-25r3

Code Behaviors & Features

Detect and mitigate GMS-2023-120 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.7.33, all versions starting from 0.8.0 before 1.0.33

Fixed versions

  • 0.7.33
  • 1.0.33

Solution

Upgrade to versions 0.7.33, 1.0.33 or above.

Source file

npm/ua-parser-js/GMS-2023-120.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:17 +0000.