First published: Tue Jan 31 2023(Updated: )
Node.js http-cache-semantics module is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw. By sending a specially-crafted regex input using request header values, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <18-9020020230327152102.rhel9 | 18-9020020230327152102.rhel9 |
redhat/nodejs | <1:16.19.1-1.el9_2 | 1:16.19.1-1.el9_2 |
redhat/nodejs | <1:16.20.2-1.el9_0 | 1:16.20.2-1.el9_0 |
redhat/rh-nodejs14 | <0:3.6-2.el7 | 0:3.6-2.el7 |
redhat/rh-nodejs14-nodejs | <0:14.21.3-2.el7 | 0:14.21.3-2.el7 |
redhat/http-cache-semantics | <4.1.1 | 4.1.1 |
Http-cache-semantics Project Http-cache-semantics | <4.1.1 | |
IBM Cloud Pak for Business Automation | <=V22.0.2 - V22.0.2-IF004 | |
IBM Cloud Pak for Business Automation | <=V21.0.3 - V21.0.3-IF020 | |
IBM Cloud Pak for Business Automation | <=V22.0.1 - V22.0.1-IF006 and later fixesV21.0.2 - V21.0.2-IF012 and later fixesV21.0.1 - V21.0.1-IF007 and later fixesV20.0.1 - V20.0.3 and later fixesV19.0.1 - V19.0.3 and later fixesV18.0.0 - V18.0.2 and later fixes |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-25881 is a vulnerability in the http-cache-semantics module of Node.js, which can be exploited by a remote attacker to cause a denial of service.
CVE-2022-25881 affects the http-cache-semantics module version 4.1.1 and certain versions of Node.js, potentially leading to a denial of service condition.
The severity of CVE-2022-25881 is high, with a CVSS score of 7.5.
To fix CVE-2022-25881, update the http-cache-semantics module to version 4.1.1 or apply the recommended patches for the affected versions of Node.js.
You can find more information about CVE-2022-25881 at the following references: [Reference 1](https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783), [Reference 2](https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83), and [Reference 3](https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332).