Security Testing focal points
1)While accessing the application using wappalyzer, it was found that application is using moment.js version 2.8.4( CVE-2016-4055) which is vulnerable to Regular expression denial of service vulnerability. It clearly indicate that this application is vulnerable to Using Components with Known Vulnerabilities .PFB the screenshot for reference and details of CVE-2016-4055 below.
CVE-2016-4055:The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time." Moment.js is vulnerable to regular expression denial of service when user input is passed unchecked into moment.duration() blocking the event loop for a period of time.
Security Testing focal points 1)While accessing the application using wappalyzer, it was found that application is using moment.js version 2.8.4( CVE-2016-4055) which is vulnerable to Regular expression denial of service vulnerability. It clearly indicate that this application is vulnerable to Using Components with Known Vulnerabilities .PFB the screenshot for reference and details of CVE-2016-4055 below. CVE-2016-4055:The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time." Moment.js is vulnerable to regular expression denial of service when user input is passed unchecked into moment.duration() blocking the event loop for a period of time.
Mitigation: 1.Update to version 2.11.2 or greater