Description
charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0386 | charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low. |
Github GHSA |
GHSA-9cp3-fh5x-xfcj | Regular Expression Denial of Service in charset |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-16T18:03:05.636Z
Reserved: 2017-10-29T00:00:00.000Z
Link: CVE-2017-16098
No data.
Status : Modified
Published: 2018-06-07T02:29:02.113
Modified: 2024-11-21T03:15:49.057
Link: CVE-2017-16098
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA