GHSA-jc97-h3h9-7xh6

Suggest an improvement
Source
https://github.com/advisories/GHSA-jc97-h3h9-7xh6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-jc97-h3h9-7xh6/GHSA-jc97-h3h9-7xh6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jc97-h3h9-7xh6
Aliases
Published
2023-04-03T17:18:51Z
Modified
2023-11-08T04:11:57.713363Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
Regular Expression Denial of Service in Deno.upgradeWebSocket API
Details

Impact

Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s,s/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server.

Patches

It is recommended that users upgrade to Deno 1.31.0.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2023-04-03T17:18:51Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-1333"
    ]
}
References

Affected packages

crates.io / deno

Package

Affected ranges

Type
SEMVER
Events
Introduced
1.12.0
Fixed
1.31.0