CVE-2020-7662Uncontrolled Resource Consumption in Project Websocket-extensions

Severity
7.5HIGHNVD
EPSS
0.3%
top 46.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 2
Latest updateJun 10

Description

websocket-extensions npm module prior to 0.1.4 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Patches

🔴Vulnerability Details

3
OSV
Regular Expression Denial of Service in websocket-extensions (NPM package)2020-06-05
GHSA
Regular Expression Denial of Service in websocket-extensions (NPM package)2020-06-05
CVEList
CVE-2020-7662: websocket-extensions npm module prior to 02020-06-02

📋Vendor Advisories

1
Red Hat
npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser2020-06-02

💬Community

2
Bugzilla
CVE-2020-7662 npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser2020-06-10
Bugzilla
CVE-2020-7663 rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser2020-06-10
CVE-2020-7662 — Uncontrolled Resource Consumption | cvebase