Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-05-05T22:55:10

Updated: 2024-08-03T06:17:54.086Z

Reserved: 2022-04-13T00:00:00

Link: CVE-2022-29167

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2022-05-05T23:15:09.083

Modified: 2023-07-21T16:42:53.857

Link: CVE-2022-29167

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-05-06T00:00:00Z

Links: CVE-2022-29167 - Bugzilla