Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-37890
HistoryJun 17, 2024 - 7:09 p.m.

CVE-2024-37890 Denial of service when handling a request with many HTTP headers in ws

2024-06-1719:09:02
CWE-476
GitHub_M
github.com
30
websocket server node.js. vulnerability fixed. maximum request headers. mitigation. threshold. header size limits.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in [email protected] (e55e510) and backported to [email protected] (22c2876), [email protected] (eeb76d3), and [email protected] (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

CNA Affected

[
  {
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.1.0, < 5.2.4"
      },
      {
        "status": "affected",
        "version": ">= 6.0.0, < 6.2.3"
      },
      {
        "status": "affected",
        "version": ">= 7.0.0, < 7.5.10"
      },
      {
        "status": "affected",
        "version": ">= 8.0.0, < 8.17.1"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:websockets:ws:*:*:*:*:*:*:*:*"
    ],
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": "2.1.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:websockets:ws:*:*:*:*:*:*:*:*"
    ],
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "5.2.4",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:websockets:ws:*:*:*:*:*:*:*:*"
    ],
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": "6.0.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:websockets:ws:*:*:*:*:*:*:*:*"
    ],
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "6.2.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:websockets:ws:*:*:*:*:*:*:*:*"
    ],
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": "7.0.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:websockets:ws:*:*:*:*:*:*:*:*"
    ],
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "7.5.10",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:websockets:ws:*:*:*:*:*:*:*:*"
    ],
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:websockets:ws:*:*:*:*:*:*:*:*"
    ],
    "vendor": "websockets",
    "product": "ws",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "8.17.1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial