Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-26044
HistoryMay 17, 2023 - 12:00 a.m.

CVE-2023-26044

2023-05-1700:00:00
ubuntu.com
ubuntu.com
21

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

27.8%

react/http is an event-driven, streaming HTTP client and server
implementation for ReactPHP. Previous versions of ReactPHP’s HTTP server
component contain a potential DoS vulnerability that can cause high CPU
load when processing large HTTP request bodies. This vulnerability has
little to no impact on the default configuration, but can be exploited when
explicitly using the RequestBodyBufferMiddleware with very large settings.
This might lead to consuming large amounts of CPU time for processing
requests and significantly delay or slow down the processing of legitimate
user requests. This issue has been addressed in release 1.9.0. Users are
advised to upgrade. Users unable to upgrade may keep the request body
limited using RequestBodyBufferMiddleware with a sensible value which
should mitigate the issue. An infrastructure or DevOps workaround could be
to place a reverse proxy in front of the ReactPHP HTTP server to filter out
any excessive HTTP request bodies.

OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchphp-react-http< anyUNKNOWN

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

27.8%

Related for UB:CVE-2023-26044