First published: Thu Jan 07 2021(Updated: )
Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Socket Engine.io | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36048 is a vulnerability in Engine.IO before 4.0.0 that allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport.
CVE-2020-36048 affects Socket Engine.io versions up to but excluding 4.0.0.
CVE-2020-36048 has a severity rating of 7.5 (high).
Yes, you can find more information about CVE-2020-36048 at the following sources: [reference 1](https://blog.caller.xyz/socketio-engineio-dos/), [reference 2](https://github.com/bcaller/kill-engine-io), [reference 3](https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b).
To fix CVE-2020-36048, you should update Socket Engine.io to version 4.0.0 or later, which includes the necessary patches to address the vulnerability.