charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0386 charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
Github GHSA Github GHSA GHSA-9cp3-fh5x-xfcj Regular Expression Denial of Service in charset
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-09-16T18:03:05.636Z

Reserved: 2017-10-29T00:00:00

Link: CVE-2017-16098

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-07T02:29:02.113

Modified: 2024-11-21T03:15:49.057

Link: CVE-2017-16098

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses