EIQ-2019-0007
|
ID |
EIQ-2019-0007 |
|
CVE |
|
|
Description |
Moment.js is vulnerable to regular expression denial of service |
|
Date |
11 Feb 2019 |
|
Severity |
2 - MEDIUM |
|
CVSSv3 score |
6.5 |
|
Status |
|
|
Assessment |
Moment.js Node.js module versions 2.19.3 and earlier are vulnerable to low-severity regular expression denial of service when parsing dates as strings.
This vulnerability is a false positive: EclecticIQ Platform uses Moment.js only to parse date and time values that signed-in platform users select through date and time picker elements in the web-based GUI. Even in the case where a crafted regex were injected and sent to Moment.js for parsing, a DDoS would last only a few seconds; the web-based GUI would hang for a few seconds, before resuming normal functionality. |
|
Mitigation |
Update to Moment.js version 2.19.3 or later. |
|
Affected versions |
None |
|
Notes |
For more information, see: |
< Back to all security issues and mitigation actions
In release notes 2.3.3
In release notes 2.3.4
In release notes 2.6.0