FKIE_CVE-2021-3794

Vulnerability from fkie_nvd - Published: 2021-09-15 13:15 - Updated: 2025-09-24 20:48
Summary
vuelidate is vulnerable to Inefficient Regular Expression Complexity

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "098878C6-FCDB-4C10-9228-0FA10E2EB50C",
              "versionEndExcluding": "0.7.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:1.0.0:alpha1:*:*:*:node.js:*:*",
              "matchCriteriaId": "E618701B-1E76-404D-893C-5779FF8EBCBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:1.0.0:alpha2:*:*:*:node.js:*:*",
              "matchCriteriaId": "0BA73805-BFD5-4B3A-9C72-D9526A34054C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha0:*:*:*:node.js:*:*",
              "matchCriteriaId": "9210EC31-BB83-4DD2-92A8-03673FDA2BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha1:*:*:*:node.js:*:*",
              "matchCriteriaId": "DB7FF45B-FF41-4821-A8B3-627F1161E97F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha10:*:*:*:node.js:*:*",
              "matchCriteriaId": "EDE4579F-3044-4EDE-9E5C-3A3CD5AAF965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha11:*:*:*:node.js:*:*",
              "matchCriteriaId": "CEFDD7DD-CBC1-4FB2-9F47-52F412CB98B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha12:*:*:*:node.js:*:*",
              "matchCriteriaId": "95527626-8101-4963-ADB8-E55AD47C558E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha13:*:*:*:node.js:*:*",
              "matchCriteriaId": "77A43419-EF8D-4E34-85D9-04160E514672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha14:*:*:*:node.js:*:*",
              "matchCriteriaId": "E6C1F6D6-5997-4324-A6DC-B2BAAC21EE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha15:*:*:*:node.js:*:*",
              "matchCriteriaId": "0DD5689F-0B31-4B18-8D46-5D7D6F176E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha16:*:*:*:node.js:*:*",
              "matchCriteriaId": "AB822BE7-8134-4018-8DDB-11422D84DD51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha17:*:*:*:node.js:*:*",
              "matchCriteriaId": "C04561B4-0FF4-45F5-9BE0-0345B9F57910",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha18:*:*:*:node.js:*:*",
              "matchCriteriaId": "D41665A2-E896-47F9-B4DA-0CA78E6DE9A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha19:*:*:*:node.js:*:*",
              "matchCriteriaId": "744F0626-3222-4D00-B717-4A0482F3C0A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha2:*:*:*:node.js:*:*",
              "matchCriteriaId": "7840BE23-CCEB-47CB-8049-63ED86BAEDEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha20:*:*:*:node.js:*:*",
              "matchCriteriaId": "1B45272F-0F16-4A21-9A1D-5596878D32BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha21:*:*:*:node.js:*:*",
              "matchCriteriaId": "617E50F8-1C1C-4948-B11F-CD4F325F2770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha22:*:*:*:node.js:*:*",
              "matchCriteriaId": "6732AECD-9A61-481A-9979-244BA9969DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha23:*:*:*:node.js:*:*",
              "matchCriteriaId": "236CF336-679B-4669-BB30-DD61C05F0662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha24:*:*:*:node.js:*:*",
              "matchCriteriaId": "0282780C-7899-401E-8A84-3DA48538447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha25:*:*:*:node.js:*:*",
              "matchCriteriaId": "5627F791-AE3D-4BE0-92EA-C95AE755C210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha3:*:*:*:node.js:*:*",
              "matchCriteriaId": "DC8FA1B8-53E1-4DDC-B303-D1E16A057A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha5:*:*:*:node.js:*:*",
              "matchCriteriaId": "98BE313E-1DB8-4123-912D-7F5A30569BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha6:*:*:*:node.js:*:*",
              "matchCriteriaId": "21927CBB-EE3A-4399-9522-DF78A1CAF7F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha7:*:*:*:node.js:*:*",
              "matchCriteriaId": "CCA4214A-45BD-4E24-844E-48586ACD1E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha8:*:*:*:node.js:*:*",
              "matchCriteriaId": "C5D75959-3CC6-435B-8FD9-DCF9F5BD6EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vuelidate_project:vuelidate:2.0.0:alpha9:*:*:*:node.js:*:*",
              "matchCriteriaId": "1CBFF882-17DF-424B-A770-8C15EA632995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "vuelidate is vulnerable to Inefficient Regular Expression Complexity"
    },
    {
      "lang": "es",
      "value": "vuelidate es vulnerable a una Complejidad de Expresiones Regulares Ineficientes"
    }
  ],
  "id": "CVE-2021-3794",
  "lastModified": "2025-09-24T20:48:12.910",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "security@huntr.dev",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-15T13:15:08.167",
  "references": [
    {
      "source": "security@huntr.dev",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d"
    },
    {
      "source": "security@huntr.dev",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7"
    }
  ],
  "sourceIdentifier": "security@huntr.dev",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1333"
        }
      ],
      "source": "security@huntr.dev",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…