Description
The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.
Remediation
References
https://nodesecurity.io/advisories/28
Related Vulnerabilities
CVE-2017-16088 Vulnerability in npm package safe-eval
CVE-2019-16728 Vulnerability in npm package dompurify
CVE-2019-17571 Vulnerability in maven package log4j:log4j
CVE-2020-5259 Vulnerability in maven package org.webjars.bowergithub.dojo:dojox
CVE-2019-10744 Vulnerability in maven package org.fujion.webjars:lodash