Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-37890

Опубликовано: 16 июн. 2024
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

A flaw was found in the Node.js WebSocket library (ws). A request with several headers exceeding the 'server.maxHeadersCount' threshold could be used to crash a ws server, leading to a denial of service.

Меры по смягчению последствий

The issue can be mitigated by reducing the maximum allowed length of the request headers using the --max-http-header-size=size or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. The issue can be mitigated also by seting server.maxHeadersCount to 0.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 2nodejs-wsNot affected
Migration Toolkit for Applications 6nodejs-wsUnder investigation
Migration Toolkit for Applications 7mta/mta-cli-rhel9Fix deferred
Migration Toolkit for Runtimesnodejs-wsUnder investigation
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Not affected
.NET 6.0 on Red Hat Enterprise Linuxrh-dotnet60-dotnetAffected
OpenShift Pipelinesopenshift-pipelines/pipelines-hub-ui-rhel8Under investigation
OpenShift Serverlessnodejs-wsWill not fix
Red Hat 3scale API Management Platform 23scale-systemNot affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-476->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2292777nodejs-ws: denial of service when handling a request with many HTTP headers

EPSS

Процентиль: 72%
0.00751
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

CVSS3: 7.5
nvd
около 1 года назад

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

CVSS3: 7.5
msrc
около 1 года назад

Описание отсутствует

CVSS3: 7.5
debian
около 1 года назад

ws is an open source WebSocket client and server for Node.js. A reques ...

CVSS3: 7.5
github
около 1 года назад

ws affected by a DoS when handling a request with many HTTP headers

EPSS

Процентиль: 72%
0.00751
Низкий

5.9 Medium

CVSS3