First published: Thu Apr 26 2018(Updated: )
Affected versions of `method-override` are vulnerable to a regular expression denial of service vulnerability when untrusted user input is passed into the `X-HTTP-Method-Override` header. ## Recommendation Update to version 2.3.10 or later
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/method-override | >=2.0.0<2.3.10 | 2.3.10 |
npm/method-override | =1.0.2 | 2.3.10 |
Express.js Method-override | <2.3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16136 is classified as a regular expression denial of service vulnerability.
To fix CVE-2017-16136, update the method-override package to version 2.3.10 or later.
CVE-2017-16136 affects method-override versions prior to 2.3.10.
The impact of CVE-2017-16136 can lead to denial of service if untrusted input is processed.
No, using method-override versions below 2.3.10 is not safe due to the vulnerability identified in CVE-2017-16136.