CVE-2017-16098

charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
References
Link Resource
https://github.com/node-modules/charset/issues/10 Exploit Third Party Advisory
https://nodesecurity.io/advisories/524 Third Party Advisory
https://github.com/node-modules/charset/issues/10 Exploit Third Party Advisory
https://nodesecurity.io/advisories/524 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:charset_project:charset:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 03:15

Type Values Removed Values Added
References () https://github.com/node-modules/charset/issues/10 - Exploit, Third Party Advisory () https://github.com/node-modules/charset/issues/10 - Exploit, Third Party Advisory
References () https://nodesecurity.io/advisories/524 - Third Party Advisory () https://nodesecurity.io/advisories/524 - Third Party Advisory

Information

Published : 2018-06-07 02:29

Updated : 2024-11-21 03:15


NVD link : CVE-2017-16098

Mitre link : CVE-2017-16098

CVE.ORG link : CVE-2017-16098


JSON object : View

Products Affected

charset_project

  • charset
CWE
CWE-400

Uncontrolled Resource Consumption