Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-31147
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
jquery-validation ReDoS in url2 due to incomplete fix of CVE-2021-43306
Source: NVD (National Vulnerability Database)
Vulnerability Description
The jQuery Validation Plugin (jquery-validation) provides drop-in validation for forms. Versions of jquery-validation prior to 1.19.5 are vulnerable to regular expression denial of service (ReDoS) when an attacker is able to supply arbitrary input to the url2 method. This is due to an incomplete fix for CVE-2021-43306. Users should upgrade to version 1.19.5 to receive a patch.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1333
Source: NVD (National Vulnerability Database)
Vulnerability Title
jquery-validation 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
npm jquery-validation是美国npm公司的为您现有的表单提供插入式验证,同时使各种定制以适合您的应用程序非常容易。 jquery-validation 1.19.5 之前版本存在安全漏洞,该漏洞源于当攻击者能够向 url2 方法提供任意输入时,可以在 jquery-validation 包中触发 ReDoS。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
jquery-validationjquery-validation < 1.19.5 -
II. Public POCs for CVE-2022-31147
#POC DescriptionSource LinkShenlong Link
1CVE-2022-31147 is a path traversal flaw in matthiasmullie/minify. This guide helps security teams test for arbitrary file read on Linux and Windows using Python and curl. It covers automated payload generation, manual validation, and safe practices for vulnerability assessment.https://github.com/amhar-hckr/Webapp_PentastPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-31147
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-31147

No comments yet


Leave a comment