7.5
CVSSv3

CVE-2020-7760

Published: 30/10/2020 Updated: 12/05/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

This affects the package codemirror prior to 5.58.2; the package org.apache.marmotta.webjars:codemirror prior to 5.58.2. The vulnerable regular expression is located in github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

codemirror codemirror

oracle application express

oracle essbase 21.2

oracle enterprise manager express user interface 19c

oracle hyperion data relationship management

oracle spatial studio

Vendor Advisories

It was discovered that codemirror, a browser-based text editor implemented in JavaScript, was vulnerable to regular expression denial-of-service For the stable distribution (buster), this problem has been fixed in version 5430-1+deb10u1 We recommend that you upgrade your codemirror-js packages For the detailed security status of codemirror-js ...