A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 version 0.2.9 and below which occurs when the application attempts to validate crafted URIs.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md | exploit third party advisory patch |
https://github.com/fracpete/vfsjfilechooser2/releases/tag/vfsjfilechooser2-0.2.9 | third party advisory release notes |
https://github.com/fracpete/vfsjfilechooser2/issues/7 | issue tracking exploit third party advisory |
https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b | third party advisory patch |
https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md | exploit third party advisory patch |