Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit ef31436

Browse files
committed
Add CVE-2021-32821 for GHSL-2020-345
1 parent e691e71 commit ef31436

File tree

2 files changed

+79
-6
lines changed

2 files changed

+79
-6
lines changed

.DS_Store

10 KB
Binary file not shown.

2021/32xxx/CVE-2021-32821.json

Lines changed: 79 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,91 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
52
"CVE_data_meta": {
3+
"ASSIGNER": "[email protected]",
64
"ID": "CVE-2021-32821",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
5+
"STATE": "PUBLIC",
6+
"TITLE": "Regular expression Denial of Service in MooTools"
97
},
8+
"affects": {
9+
"vendor": {
10+
"vendor_data": [
11+
{
12+
"product": {
13+
"product_data": [
14+
{
15+
"product_name": "mootools-core",
16+
"version": {
17+
"version_data": [
18+
{
19+
"version_affected": "<=",
20+
"version_name": "1.6.0",
21+
"version_value": "1.6.0"
22+
}
23+
]
24+
}
25+
}
26+
]
27+
},
28+
"vendor_name": "mootools"
29+
}
30+
]
31+
}
32+
},
33+
"data_format": "MITRE",
34+
"data_type": "CVE",
35+
"data_version": "4.0",
1036
"description": {
1137
"description_data": [
1238
{
1339
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
40+
"value": "MooTools is a collection of JavaScript utilities for JavaScript developers. All known versions include a CSS selector parser that is vulnerable to Regular Expression Denial of Service (ReDoS). An attack requires that an attacker can inject a string into a CSS selector at runtime, which is quite common with e.g. jQuery CSS selectors. No patches are available for this issue."
41+
}
42+
]
43+
},
44+
"generator": {
45+
"engine": "Vulnogram 0.0.9"
46+
},
47+
"impact": {
48+
"cvss": {
49+
"attackComplexity": "LOW",
50+
"attackVector": "LOCAL",
51+
"availabilityImpact": "HIGH",
52+
"baseScore": 6.2,
53+
"baseSeverity": "MEDIUM",
54+
"confidentialityImpact": "NONE",
55+
"integrityImpact": "NONE",
56+
"privilegesRequired": "NONE",
57+
"scope": "UNCHANGED",
58+
"userInteraction": "NONE",
59+
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
60+
"version": "3.1"
61+
}
62+
},
63+
"problemtype": {
64+
"problemtype_data": [
65+
{
66+
"description": [
67+
{
68+
"lang": "eng",
69+
"value": "CWE-400 Uncontrolled Resource Consumption"
70+
}
71+
]
1572
}
1673
]
74+
},
75+
"references": {
76+
"reference_data": [
77+
{
78+
"name": "https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/",
79+
"refsource": "CONFIRM",
80+
"url": "https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/"
81+
}
82+
]
83+
},
84+
"source": {
85+
"advisory": "GHSL-2020-345",
86+
"defect": [
87+
"GHSL-2020-345"
88+
],
89+
"discovery": "UNKNOWN"
1790
}
1891
}

0 commit comments

Comments
 (0)