First published: Mon Nov 28 2022(Updated: )
decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/decode-uri-component | <0.2.1 | 0.2.1 |
Decode-uri-component Project Decode-uri-component | =0.2.0 | |
redhat/rh-nodejs14 | <0:3.6-2.el7 | 0:3.6-2.el7 |
redhat/rh-nodejs14-nodejs | <0:14.21.3-2.el7 | 0:14.21.3-2.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-38900 is a vulnerability in decode-uri-component 0.2.0 that allows an attacker to cause a denial of service by providing a specially crafted input.
CVE-2022-38900 can result in a denial of service when the vulnerable version of decode-uri-component (0.2.0) processes a malicious input.
The severity of CVE-2022-38900 is high, with a severity score of 7.5.
To mitigate CVE-2022-38900, update decode-uri-component to version 0.2.1 or higher.
For more information about CVE-2022-38900, you can visit the following sources: CVE (https://www.cve.org/CVERecord?id=CVE-2022-38900), NVD (https://nvd.nist.gov/vuln/detail/CVE-2022-38900), GitHub Advisory (https://github.com/advisories/GHSA-w573-4hg7-7wgq), Red Hat Bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=2170644), and Red Hat Security Advisory (https://access.redhat.com/errata/RHSA-2023:1743).