Lucene search

K
nodejsCristian-Alexandru StaicuNODEJS:525
HistorySep 08, 2017 - 6:07 p.m.

Regular Expression Denial of Service

2017-09-0818:07:02
Cristian-Alexandru Staicu
www.npmjs.com
39

0.011 Low

EPSS

Percentile

84.8%

Overview

Affected versions of tough-cookie are susceptible to a regular expression denial of service.

The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.

If node was compiled using the -DHTTP_MAX_HEADER_SIZE however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.

Recommendation

Update to version 2.3.3 or later.

References

CPENameOperatorVersion
tough-cookielt2.3.3