Koa uses an evil regex to parse the X-Forwarded-Proto and X-Forwarded-Host HTTP headers. This can be exploited to carry out a Denial-of-Service attack.
Coming soon.
This is a Regex Denial-of-Service attack and causes memory exhaustion. The regex should be improved and empty values should not be allowed.
{
"github_reviewed_at": "2025-02-12T19:23:09Z",
"github_reviewed": true,
"severity": "CRITICAL",
"nvd_published_at": "2025-02-12T18:15:28Z",
"cwe_ids": [
"CWE-1333"
]
}