First published: Thu Feb 16 2023(Updated: )
Node.js is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw in the Headers.set() and Headers.append() methods in the fetch API. By sending a specially-crafted regex input, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <18-9020020230327152102.rhel9 | 18-9020020230327152102.rhel9 |
redhat/nodejs | <1:16.19.1-1.el9_2 | 1:16.19.1-1.el9_2 |
redhat/nodejs | <1:16.20.2-1.el9_0 | 1:16.20.2-1.el9_0 |
Nodejs Undici | <5.19.1 | |
IBM Cognos Dashboards on Cloud Pak for Data | <=4.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-24807 is a vulnerability in Node.js that allows for denial of service attacks due to regular expression denial of service (ReDoS).
CVE-2023-24807 affects Node.js by making the `Headers.set()` and `Headers.append()` methods vulnerable to ReDoS attacks when untrusted values are passed into the functions.
CVE-2023-24807 has a severity level of high with a CVSS score of 7.5.
To fix CVE-2023-24807, you should update your Node.js version to 19.6.1 or higher.
You can find more information about CVE-2023-24807 on the Red Hat Bugzilla website: [link](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2172205)