Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-29167

Опубликовано: 05 мая 2022
Источник: nvd
CVSS3: 7.4
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse Host HTTP header (Hawk.utils.parseHost()), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. parseHost() was patched in 9.0.1 to use built-in URL class to parse hostname instead. Hawk.authenticate() accepts options argument. If that contains host and port, those would be used instead of a call to utils.parseHost().

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:mozilla:hawk:*:*:*:*:*:node.js:*:*
Версия до 9.0.1 (исключая)

EPSS

Процентиль: 35%
0.00143
Низкий

7.4 High

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-400
CWE-1333

Связанные уязвимости

CVSS3: 7.4
ubuntu
почти 4 года назад

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.

CVSS3: 7.5
redhat
почти 4 года назад

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.

CVSS3: 7.4
debian
почти 4 года назад

Hawk is an HTTP authentication scheme providing mechanisms for making ...

CVSS3: 7.4
github
больше 3 лет назад

Uncontrolled Resource Consumption in Hawk

EPSS

Процентиль: 35%
0.00143
Низкий

7.4 High

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-400
CWE-1333