CVE-2021-4305

A vulnerability was found in Woorank robots-txt-guard. It has been rated as problematic. Affected by this issue is the function makePathPattern of the file lib/patterns.js. The manipulation of the argument pattern leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The name of the patch is c03827cd2f9933619c23894ce7c98401ea824020. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217448.
References
Link Resource
https://vuldb.com/?id.217448 Third Party Advisory
https://github.com/Woorank/robots-txt-guard/commit/c03827cd2f9933619c23894ce7c98401ea824020 Patch Third Party Advisory
https://github.com/Woorank/robots-txt-guard/pull/4 Patch Third Party Advisory
https://vuldb.com/?ctiid.217448 Permissions Required Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:bridgeline:robots-txt-guard:*:*:*:*:*:*:*:*

Information

Published : 2023-01-05 03:15

Updated : 2023-01-11 11:20


NVD link : CVE-2021-4305

Mitre link : CVE-2021-4305


JSON object : View

CWE
CWE-1333

Inefficient Regular Expression Complexity

Advertisement

dedicated server usa

Products Affected

bridgeline

  • robots-txt-guard