First published: Thu Mar 21 2024(Updated: )
A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. An attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration. Reference: <a href="https://hackerone.com/reports/2284065">https://hackerone.com/reports/2284065</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Node.js |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2270559 is critical due to the potential for Denial of Service (DoS) attacks.
To fix REDHAT-BUG-2270559, you should update Node.js to the latest version that addresses this vulnerability.
The vulnerability REDHAT-BUG-2270559 is caused by the fetch() function in Node.js decoding Brotli responses from untrusted URLs, leading to resource exhaustion.
Any application using Node.js that utilizes the fetch() function with untrusted URLs is affected by REDHAT-BUG-2270559.
If you are affected by REDHAT-BUG-2270559, it is recommended to stop using the fetch() function with untrusted URLs until a patch is applied.