ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options.
References
Link | Resource |
---|---|
https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff | Patch Third Party Advisory |
https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 | Exploit Mitigation Patch Third Party Advisory |
https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E | |
https://security.netapp.com/advisory/ntap-20210706-0005/ | Third Party Advisory |
https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff | Patch Third Party Advisory |
https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 | Exploit Mitigation Patch Third Party Advisory |
https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E | |
https://security.netapp.com/advisory/ntap-20210706-0005/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff - Patch, Third Party Advisory | |
References | () https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 - Exploit, Mitigation, Patch, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E - | |
References | () https://security.netapp.com/advisory/ntap-20210706-0005/ - Third Party Advisory |
04 Jun 2022, 02:13
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (MLIST) https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E - Mailing List, Patch, Third Party Advisory | |
CPE | cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:* |
06 Jul 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jun 2021, 16:50
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff - Patch, Third Party Advisory | |
References | (CONFIRM) https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 - Exploit, Mitigation, Patch, Third Party Advisory | |
CPE | cpe:2.3:a:ws_project:ws:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
25 May 2021, 20:00
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-400 |
25 May 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-25 19:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32640
Mitre link : CVE-2021-32640
CVE.ORG link : CVE-2021-32640
JSON object : View
Products Affected
netapp
- e-series_performance_analyzer
ws_project
- ws
CWE
CWE-400
Uncontrolled Resource Consumption