First published: Thu Jan 07 2021(Updated: )
socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Socket Socket.io-parser Node.js | <3.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36049 is a vulnerability in socket.io-parser before version 3.4.1 that allows attackers to cause a denial of service (memory consumption).
CVE-2020-36049 can cause a denial of service (memory consumption) by exploiting a concatenation approach used in socket.io-parser before version 3.4.1.
The severity of CVE-2020-36049 is high, with a CVSS score of 7.5.
To fix CVE-2020-36049, upgrade to a version of socket.io-parser that is after 3.4.1.
You can find more information about CVE-2020-36049 in the references provided: [reference 1](https://blog.caller.xyz/socketio-engineio-dos/), [reference 2](https://github.com/bcaller/kill-engine-io), [reference 3](https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55).