Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2020/07/19/1 | Mailing List Third Party Advisory |
https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44 | Patch Third Party Advisory |
https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e | Patch Third Party Advisory |
https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-07-21 14:15
Updated : 2024-02-04 21:00
NVD link : CVE-2018-21036
Mitre link : CVE-2018-21036
CVE.ORG link : CVE-2018-21036
JSON object : View
Products Affected
sailsjs
- sails
CWE
CWE-20
Improper Input Validation