CVE-2021-32821

NameCVE-2021-32821
DescriptionMooTools is a collection of JavaScript utilities for JavaScript developers. All known versions include a CSS selector parser that is vulnerable to Regular Expression Denial of Service (ReDoS). An attack requires that an attacker can inject a string into a CSS selector at runtime, which is quite common with e.g. jQuery CSS selectors. No patches are available for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1032664

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mootools (PTS)buster1.4.5~debian1-2.1vulnerable
sid, trixie, bookworm, bullseye1.4.5~debian1-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mootoolssource(unstable)(unfixed)1032664

Notes

[bookworm] - mootools <no-dsa> (Minor issue)
[bullseye] - mootools <no-dsa> (Minor issue)
[buster] - mootools <no-dsa> (Minor issue)
https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/
No plan to fix this upstream as upstream consider it too low impact.

Search for package or bug name: Reporting problems