CVE-2021-3749

CVSS V2 High 7.8 CVSS V3 High 7.5
Description
axios is vulnerable to Inefficient Regular Expression Complexity
Overview
  • CVE ID
  • CVE-2021-3749
  • Assigner
  • security@huntr.dev
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-08-31T11:15:07
  • Last Modified Date
  • 2022-10-07T02:19:50
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:axios:axios:*:*:*:*:*:node.js:*:* 1 OR 0.21.1
cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:* 1 OR 1.0
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:* 1 OR 21.1 21.7.0.0.0
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.8
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf Third Party Advisory
https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929 Patch Third Party Advisory
https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31 Exploit Patch Third Party Advisory
https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E Mailing List Patch Third Party Advisory
https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-04-04 00:39:12 Added to TrackCVE
2022-12-05 09:21:18 2021-08-31T11:15Z 2021-08-31T11:15:07 CVE Published Date updated
2022-12-05 09:21:18 2022-10-07T02:19:50 CVE Modified Date updated
2022-12-05 09:21:18 Analyzed Vulnerability Status updated
2022-12-05 09:21:22 References updated