Vulnerability Details CVE-2021-23354
The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 59.9%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2021-23354
-
cpe:2.3:a:adaltas:printf:-
-
cpe:2.3:a:adaltas:printf:0.0.1
-
cpe:2.3:a:adaltas:printf:0.0.2
-
cpe:2.3:a:adaltas:printf:0.0.3
-
cpe:2.3:a:adaltas:printf:0.0.4
-
cpe:2.3:a:adaltas:printf:0.0.5
-
cpe:2.3:a:adaltas:printf:0.0.6
-
cpe:2.3:a:adaltas:printf:0.0.7
-
cpe:2.3:a:adaltas:printf:0.1.0
-
cpe:2.3:a:adaltas:printf:0.1.1
-
cpe:2.3:a:adaltas:printf:0.1.2
-
cpe:2.3:a:adaltas:printf:0.1.3
-
cpe:2.3:a:adaltas:printf:0.2.0
-
cpe:2.3:a:adaltas:printf:0.2.1
-
cpe:2.3:a:adaltas:printf:0.2.2
-
cpe:2.3:a:adaltas:printf:0.2.3
-
cpe:2.3:a:adaltas:printf:0.2.4
-
cpe:2.3:a:adaltas:printf:0.2.5
-
cpe:2.3:a:adaltas:printf:0.3.0
-
cpe:2.3:a:adaltas:printf:0.4.0
-
cpe:2.3:a:adaltas:printf:0.5.1
-
cpe:2.3:a:adaltas:printf:0.5.2
-
cpe:2.3:a:adaltas:printf:0.5.3
-
cpe:2.3:a:adaltas:printf:0.6.0