CVE-2021-32640

Source
https://cve.org/CVERecord?id=CVE-2021-32640
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32640.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-32640
Aliases
Downstream
Related
Published
2021-05-25T19:15:07.767Z
Modified
2026-02-13T02:22:23.437804Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the Sec-Websocket-Protocol header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the <code>--max-http-header-size=size</code> and/or the <code>maxHeaderSize</code> options.

References

Affected packages

Git / github.com/websockets/ws

Affected ranges

Type
GIT
Repo
https://github.com/websockets/ws
Events

Affected versions

5.*
5.0.0
5.1.0
5.1.1
5.2.0
5.2.1
6.*
6.0.0
6.1.0
6.1.1
6.1.2
6.1.3
6.1.4
6.2.0
6.2.1
7.*
7.0.0
7.0.1
7.1.0
7.1.1
7.1.2
7.2.0
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
7.3.0
7.3.1
7.4.0
7.4.1
7.4.2
7.4.3
7.4.4
7.4.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32640.json"