You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ws is an open-source WebSocket client and server for Node.js. A request with a number of headers exceeding the "server.maxHeadersCount" threshold could be used to crash a ws server. In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the "--max-http-header-size=size" and/or the "maxHeaderSize" options so that no more headers than the "server.maxHeadersCount" limit can be sent. 2. Set "server.maxHeadersCount" to "0" so that no limit is applied. This issue affects the package ws versions 2.1.0 through 5.2.3, 6.0.0 through 6.2.2, 7.0.0 through 7.5.9, and 8.0.0 through 8.17.0.
Additional Info Attack vector: NETWORK Attack complexity: LOW Confidentiality impact: NONE Availability impact: HIGH Remediation Upgrade Recommendation: 8.17.1
The text was updated successfully, but these errors were encountered:
Checkmarx (SCA): Vulnerable Package
Vulnerability: Read More about CVE-2024-37890
Applications: Visão Geral
Checkmarx Project: takenet/blip-ds
Repository URL: https://github.com/takenet/blip-ds
Branch: master
Scan ID: 6f0d76c7-ef9a-4ef2-94dc-ca624d6b1227
The ws is an open-source WebSocket client and server for Node.js. A request with a number of headers exceeding the "server.maxHeadersCount" threshold could be used to crash a ws server. In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the "--max-http-header-size=size" and/or the "maxHeaderSize" options so that no more headers than the "server.maxHeadersCount" limit can be sent. 2. Set "server.maxHeadersCount" to "0" so that no limit is applied. This issue affects the package ws versions 2.1.0 through 5.2.3, 6.0.0 through 6.2.2, 7.0.0 through 7.5.9, and 8.0.0 through 8.17.0.
Additional Info
Attack vector: NETWORK
Attack complexity: LOW
Confidentiality impact: NONE
Availability impact: HIGH
Remediation Upgrade Recommendation: 8.17.1
The text was updated successfully, but these errors were encountered: