uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. This has been patched in uap-core 0.7.3.
No PoCs from references.
- https://github.com/Banyaon/And-ifclcs-
- https://github.com/Banyaon/supreme-robot
- https://github.com/Banyaon/vigilant-fiesta
- https://github.com/doyensec/regexploit
- https://github.com/engn33r/awesome-redos-security
- https://github.com/retr0-13/regexploit