First published: Tue Jun 02 2020(Updated: )
Faye websocket-extensions npm module is vulnerable to a denial of service, caused by improper input validation by the Sec-WebSocket-Extensions header. By using a specially-crafted value in the Sec-WebSocket-Extensions header, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/servicemesh-grafana | <0:6.2.2-38.el8 | 0:6.2.2-38.el8 |
redhat/servicemesh-grafana | <0:6.4.3-11.el8 | 0:6.4.3-11.el8 |
Websocket-extensions Project Websocket-extensions | <0.1.4 | |
redhat/npmjs-websocket-extensions | <0.1.4 | 0.1.4 |
<=10.0 |
https://github.com/faye/websocket-extensions-node/commit/29496f6838bfadfe5a2f85dff33ed0ba33873237
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-7662 is a vulnerability in the websocket-extensions npm module that allows Denial of Service (DoS) via Regex Backtracking.
The vulnerability in websocket-extensions npm module can be exploited by sending a header with an unclosed string parameter value containing a repeating two-byte sequence of a backslash and another character.
CVE-2020-7662 has a severity rating of 7.5 (high).
To fix the vulnerability, update the websocket-extensions npm module to version 0.1.4 or later.
You can find more information about CVE-2020-7662 in the following references: [Reference 1](https://github.com/faye/websocket-extensions-node/security/advisories/GHSA-g78m-2chm-r7qv), [Reference 2](https://github.com/faye/websocket-extensions-node/commit/29496f6838bfadfe5a2f85dff33ed0ba33873237), [Reference 3](https://access.redhat.com/errata/RHSA-2020:2796).