Path to vulnerable library: /samples/Clients/src/MvcAutomaticTokenManagement/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/5_EntityFramework/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Clients/src/MvcCode/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/4_JavaScriptClient/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/6_AspNetIdentity/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/2_InteractiveAspNetCore/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/3_AspNetCoreAndApis/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js
Path to vulnerable library: /samples/Clients/src/MvcAutomaticTokenManagement/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/3_AspNetCoreAndApis/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/5_EntityFramework/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/2_InteractiveAspNetCore/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Clients/src/MvcCode/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/6_AspNetIdentity/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/4_JavaScriptClient/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js
The jQuery Validation Plugin provides drop-in validation for your existing forms. It is published as an npm package "jquery-validation". jquery-validation before version 1.19.3 contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service). This is fixed in 1.19.3.
CVE-2021-21252 - Medium Severity Vulnerability
Vulnerable Libraries - jquery.validate-1.17.0.min.js, jquery.validate-1.17.0.js
jquery.validate-1.17.0.min.js
Client-side form validation made easy
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.17.0/jquery.validate.min.js
Path to vulnerable library: /samples/Clients/src/MvcAutomaticTokenManagement/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/5_EntityFramework/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Clients/src/MvcCode/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/4_JavaScriptClient/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/6_AspNetIdentity/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/2_InteractiveAspNetCore/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js,/samples/Quickstarts/3_AspNetCoreAndApis/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js
Dependency Hierarchy: - :x: **jquery.validate-1.17.0.min.js** (Vulnerable Library)
jquery.validate-1.17.0.js
Client-side form validation made easy
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.17.0/jquery.validate.js
Path to vulnerable library: /samples/Clients/src/MvcAutomaticTokenManagement/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/3_AspNetCoreAndApis/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/5_EntityFramework/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/2_InteractiveAspNetCore/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Clients/src/MvcCode/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/6_AspNetIdentity/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js,/samples/Quickstarts/4_JavaScriptClient/src/MvcClient/wwwroot/lib/jquery-validation/dist/jquery.validate.js
Dependency Hierarchy: - :x: **jquery.validate-1.17.0.js** (Vulnerable Library)
Found in HEAD commit: 7d47835acfa4a3e45eb8050d9af2dbb2c6ad1df4
Found in base branch: master
Vulnerability Details
The jQuery Validation Plugin provides drop-in validation for your existing forms. It is published as an npm package "jquery-validation". jquery-validation before version 1.19.3 contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service). This is fixed in 1.19.3.
Publish Date: 2021-01-13
URL: CVE-2021-21252
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-jxwx-85vp-gvwm
Release Date: 2021-01-13
Fix Resolution: jquery-validation - 1.19.3