Vulnerability Details CVE-2021-33580
User controlled `request.getHeader("Referer")`, `request.getRequestURL()` and `request.getQueryString()` are used to build and run a regex expression. The attacker doesn't have to use a browser and may send a specially crafted Referer header programmatically. Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side. This problem has been fixed in Roller 6.0.2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.036
EPSS Ranking 87.3%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 4.3
Products affected by CVE-2021-33580
-
cpe:2.3:a:apache:roller:0.9.5
-
cpe:2.3:a:apache:roller:0.9.6
-
cpe:2.3:a:apache:roller:0.9.6.3
-
cpe:2.3:a:apache:roller:0.9.6.4
-
cpe:2.3:a:apache:roller:0.9.7
-
cpe:2.3:a:apache:roller:0.9.7.1
-
cpe:2.3:a:apache:roller:0.9.7.2
-
cpe:2.3:a:apache:roller:0.9.8
-
cpe:2.3:a:apache:roller:0.9.8.1
-
cpe:2.3:a:apache:roller:0.9.8.2
-
cpe:2.3:a:apache:roller:0.9.9
-
cpe:2.3:a:apache:roller:1.0
-
cpe:2.3:a:apache:roller:1.0.1
-
cpe:2.3:a:apache:roller:1.1
-
cpe:2.3:a:apache:roller:1.1.1
-
cpe:2.3:a:apache:roller:1.1.2
-
cpe:2.3:a:apache:roller:1.2
-
cpe:2.3:a:apache:roller:1.3
-
cpe:2.3:a:apache:roller:2.0
-
cpe:2.3:a:apache:roller:2.0.1
-
cpe:2.3:a:apache:roller:2.0.2
-
cpe:2.3:a:apache:roller:2.1
-
cpe:2.3:a:apache:roller:2.1.1
-
cpe:2.3:a:apache:roller:2.3
-
cpe:2.3:a:apache:roller:2.3.1
-
cpe:2.3:a:apache:roller:2.4
-
cpe:2.3:a:apache:roller:3.0
-
cpe:2.3:a:apache:roller:3.0.1
-
cpe:2.3:a:apache:roller:3.1
-
cpe:2.3:a:apache:roller:3.1.1
-
cpe:2.3:a:apache:roller:4.0
-
cpe:2.3:a:apache:roller:4.0.1
-
cpe:2.3:a:apache:roller:4.1
-
cpe:2.3:a:apache:roller:5.0
-
cpe:2.3:a:apache:roller:5.0.1
-
cpe:2.3:a:apache:roller:5.0.2
-
cpe:2.3:a:apache:roller:5.0.3
-
cpe:2.3:a:apache:roller:5.0.4
-
cpe:2.3:a:apache:roller:5.1.0
-
cpe:2.3:a:apache:roller:5.1.1
-
cpe:2.3:a:apache:roller:5.1.2
-
cpe:2.3:a:apache:roller:5.2.0
-
cpe:2.3:a:apache:roller:5.2.1
-
cpe:2.3:a:apache:roller:5.2.10
-
cpe:2.3:a:apache:roller:5.2.2
-
cpe:2.3:a:apache:roller:5.2.3
-
cpe:2.3:a:apache:roller:5.2.4
-
cpe:2.3:a:apache:roller:6.0.0
-
cpe:2.3:a:apache:roller:6.0.1