CVE-2021-32821

NameCVE-2021-32821
DescriptionMooTools is a collection of JavaScript utilities for JavaScript developers. All known versions include a CSS selector parser that is vulnerable to Regular Expression Denial of Service (ReDoS). An attack requires that an attacker can inject a string into a CSS selector at runtime, which is quite common with e.g. jQuery CSS selectors. No patches are available for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1032664

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mootools (PTS)jessie, buster, stretch1.4.5~debian1-2.1vulnerable
sid, trixie, bullseye, bookworm1.4.5~debian1-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mootoolssourcejessie(unfixed)end-of-life
mootoolssourcestretch(unfixed)end-of-life
mootoolssource(unstable)(unfixed)unimportant1032664

Notes

https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/
No plan to fix this upstream as upstream consider it too low impact.
Negligible securiy impact

Search for package or bug name: Reporting problems