Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: snyk
Published: 2023-02-25T05:00:01.387Z
Updated: 2024-08-02T11:39:06.569Z
Reserved: 2023-02-20T10:28:48.921Z
Link: CVE-2023-26103
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-02-25T05:15:12.343
Modified: 2024-11-21T07:50:46.877
Link: CVE-2023-26103
Redhat
No data.