// For flags

CVE-2024-37890

Denial of service when handling a request with many HTTP headers in ws

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

ws es un cliente y servidor WebSocket de código abierto para Node.js. Una solicitud con una cantidad de encabezados que exceda el umbral server.maxHeadersCount podría usarse para bloquear un servidor ws. La vulnerabilidad se solucionó en ws@8.17.1 (e55e510) y se actualizó a ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3) y ws@5.2.4 (4abd8f6). En versiones vulnerables de ws, el problema se puede mitigar de las siguientes maneras: 1. Reduzca la longitud máxima permitida de los encabezados de solicitud usando las opciones --max-http-header-size=size y/o maxHeaderSize para que no haya más Se pueden enviar encabezados superiores al límite server.maxHeadersCount. 2. Establezca server.maxHeadersCount en 0 para que no se aplique ningún límite.

A flaw was found in the Node.js WebSocket library (ws). A request with several headers exceeding the 'server.maxHeadersCount' threshold could be used to crash a ws server, leading to a denial of service.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-06-10 CVE Reserved
  • 2024-06-17 CVE Published
  • 2024-06-18 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Websockets
Search vendor "Websockets"
Ws
Search vendor "Websockets" for product "Ws"
>= 2.1.0 < 5.2.4
Search vendor "Websockets" for product "Ws" and version " >= 2.1.0 < 5.2.4"
en
Affected
Websockets
Search vendor "Websockets"
Ws
Search vendor "Websockets" for product "Ws"
>= 6.0.0 < 6.2.3
Search vendor "Websockets" for product "Ws" and version " >= 6.0.0 < 6.2.3"
en
Affected
Websockets
Search vendor "Websockets"
Ws
Search vendor "Websockets" for product "Ws"
>= 7.0.0 < 7.5.10
Search vendor "Websockets" for product "Ws" and version " >= 7.0.0 < 7.5.10"
en
Affected
Websockets
Search vendor "Websockets"
Ws
Search vendor "Websockets" for product "Ws"
>= 8.0.0 < 8.17.1
Search vendor "Websockets" for product "Ws" and version " >= 8.0.0 < 8.17.1"
en
Affected