Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-29167

Опубликовано: 05 мая 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.4

Описание

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse Host HTTP header (Hawk.utils.parseHost()), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. parseHost() was patched in 9.0.1 to use built-in URL class to parse hostname instead. Hawk.authenticate() accepts options argument. If that contains host and port, those would be used instead of a call to utils.parseHost().

РелизСтатусПримечание
bionic

released

6.0.1+dfsg-1+deb10u1build0.18.04.1
devel

not-affected

9.0.1-1
esm-apps/bionic

released

6.0.1+dfsg-1+deb10u1build0.18.04.1
esm-apps/focal

released

7.1.2+dfsg-1ubuntu0.1
esm-apps/jammy

released

8.0.1+dfsg-1ubuntu0.22.04.1
focal

released

7.1.2+dfsg-1ubuntu0.1
jammy

released

8.0.1+dfsg-1ubuntu0.22.04.1
kinetic

released

8.0.1+dfsg-1ubuntu0.22.10.1
lunar

not-affected

9.0.1-1
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 35%
0.00143
Низкий

5 Medium

CVSS2

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 4 года назад

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.

CVSS3: 7.4
nvd
почти 4 года назад

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.

CVSS3: 7.4
debian
почти 4 года назад

Hawk is an HTTP authentication scheme providing mechanisms for making ...

CVSS3: 7.4
github
больше 3 лет назад

Uncontrolled Resource Consumption in Hawk

EPSS

Процентиль: 35%
0.00143
Низкий

5 Medium

CVSS2

7.4 High

CVSS3