Описание
Regular Expression Denial of Service in hawk
Versions of hawk prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's.
Recommendation
Update to hawk version 4.1.1 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2016-2515
- https://github.com/hueniverse/hawk/issues/168
- https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa
- https://bugzilla.redhat.com/show_bug.cgi?id=1309721
- https://github.com/advisories/GHSA-jcpv-g9rr-qxrc
- https://www.npmjs.com/advisories/77
- http://www.openwall.com/lists/oss-security/2016/02/20/1
- http://www.openwall.com/lists/oss-security/2016/02/20/2
Пакеты
Наименование
hawk
npm
Затронутые версииВерсия исправления
>= 4.0.0, < 4.1.1
4.1.1
Наименование
hawk
npm
Затронутые версииВерсия исправления
< 3.1.3
3.1.3
Связанные уязвимости
redhat
около 10 лет назад
Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression.
CVSS3: 7.5
nvd
почти 10 лет назад
Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression.