ansi-regexproject ansi-regex CVE-2021-3807 in Ansi Regexproject and Oracle Products
Published on September 17, 2021

Inefficient Regular Expression Complexity in chalk/ansi-regex

product logo product logo
ansi-regex is vulnerable to Inefficient Regular Expression Complexity

NVD

Weakness Type

What is a ReDoS Vulnerability?

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles. Some regular expression engines have a feature called "backtracking". If the token cannot match, the engine "backtracks" to a position that may result in a different token that can match. Backtracking becomes a weakness if all of these conditions are met:

CVE-2021-3807 has been classified to as a ReDoS vulnerability or weakness.


Products Associated with CVE-2021-3807

stack.watch emails you whenever new vulnerabilities are published in Ansi Regexproject Ansi Regex or Oracle Communications Cloud Native Core Policy. Just hit a watch button to start following.

 
 

Affected Versions

chalk/ansi-regex:

Exploit Probability

EPSS
0.22%
Percentile
43.82%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.