Koa uses an evil regex to parse the X-Forwarded-Proto
and X-Forwarded-Host
HTTP headers. This can be exploited to carry out a Denial-of-Service attack.
Coming soon.
This is a Regex Denial-of-Service attack and causes memory exhaustion. The regex should be improved and empty values should not be allowed.
{ "nvd_published_at": "2025-02-12T18:15:28Z", "cwe_ids": [ "CWE-1333" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2025-02-12T19:23:09Z" }