CVE-2024-37890

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-37890
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-37890.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-37890
Aliases
Downstream
Related
Published
2024-06-17T19:09:02Z
Modified
2025-10-22T18:42:44.537790Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of service when handling a request with many HTTP headers in ws
Details

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

Database specific
{
    "cwe_ids": [
        "CWE-476"
    ]
}
References

Affected packages

Git / github.com/websockets/ws

Affected ranges

Type
GIT
Repo
https://github.com/websockets/ws
Events
Type
GIT
Repo
https://github.com/websockets/ws
Events
Type
GIT
Repo
https://github.com/websockets/ws
Events
Type
GIT
Repo
https://github.com/websockets/ws
Events

Affected versions

2.*

2.1.0
2.2.0
2.2.1
2.2.2
2.2.3
2.3.0
2.3.1

3.*

3.0.0
3.1.0
3.2.0
3.3.0
3.3.1
3.3.2
3.3.3

4.*

4.0.0
4.1.0

5.*

5.0.0
5.1.0
5.1.1
5.2.0
5.2.1
5.2.2
5.2.3

6.*

6.0.0
6.1.0
6.1.1
6.1.2
6.1.3
6.1.4
6.2.0
6.2.1
6.2.2

7.*

7.0.0
7.0.1
7.1.0
7.1.1
7.1.2
7.2.0
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
7.3.0
7.3.1
7.4.0
7.4.1
7.4.2
7.4.3
7.4.4
7.4.5
7.4.6
7.5.0
7.5.1
7.5.2
7.5.3
7.5.4
7.5.5
7.5.6
7.5.7
7.5.8
7.5.9

8.*

8.0.0
8.1.0
8.10.0
8.11.0
8.12.0
8.12.1
8.13.0
8.14.0
8.14.1
8.14.2
8.15.0
8.15.1
8.16.0
8.17.0
8.2.0
8.2.1
8.2.2
8.2.3
8.3.0
8.4.0
8.4.1
8.4.2
8.5.0
8.6.0
8.7.0
8.8.0
8.8.1
8.9.0