Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2mhh-w6q8-5hxw

Опубликовано: 18 фев. 2019
Источник: github
Github: Прошло ревью

Описание

Remote Memory Disclosure in ws

Versions of ws prior to 1.0.1 are affected by a remote memory disclosure vulnerability.

In certain rare circumstances, applications which allow users to control the arguments of a client.ping() call will cause ws to send the contents of an allocated but non-zero-filled buffer to the server. This may disclose sensitive information that still exists in memory after previous use of the memory for other tasks.

Proof of Concept

var ws = require('ws') var server = new ws.Server({ port: 9000 }) var client = new ws('ws://localhost:9000') client.on('open', function () { console.log('open') client.ping(50) // this sends a non-zeroed buffer of 50 bytes client.on('pong', function (data) { console.log('got pong') console.log(data) // Data from the client. }) })

Recommendation

Update to version 1.0.1 or greater.

Пакеты

Наименование

ws

npm
Затронутые версииВерсия исправления

< 1.0.1

1.0.1

EPSS

Процентиль: 57%
0.00345
Низкий

Дефекты

CWE-201

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

A vulnerability was found in the ping functionality of the ws module before 1.0.0 which allowed clients to allocate memory by sending a ping frame. The ping functionality by default responds with a pong frame and the previously given payload of the ping frame. This is exactly what you expect, but internally ws always transforms all data that we need to send to a Buffer instance and that is where the vulnerability existed. ws didn't do any checks for the type of data it was sending. With buffers in node when you allocate it when a number instead of a string it will allocate the amount of bytes.

CVSS3: 7.5
nvd
больше 7 лет назад

A vulnerability was found in the ping functionality of the ws module before 1.0.0 which allowed clients to allocate memory by sending a ping frame. The ping functionality by default responds with a pong frame and the previously given payload of the ping frame. This is exactly what you expect, but internally ws always transforms all data that we need to send to a Buffer instance and that is where the vulnerability existed. ws didn't do any checks for the type of data it was sending. With buffers in node when you allocate it when a number instead of a string it will allocate the amount of bytes.

CVSS3: 7.5
debian
больше 7 лет назад

A vulnerability was found in the ping functionality of the ws module b ...

EPSS

Процентиль: 57%
0.00345
Низкий

Дефекты

CWE-201