Description
The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.
Remediation
References
https://nodesecurity.io/advisories/28
Related Vulnerabilities
CVE-2020-28248 Vulnerability in npm package png-img
CVE-2023-29215 Vulnerability in maven package org.apache.linkis:linkis-metadata-query-service-jdbc
CVE-2019-1003054 Vulnerability in maven package info.bluefloyd.jenkins:jenkins-jira-issue-updater
CVE-2020-2235 Vulnerability in maven package org.jenkins-ci.plugins:pipeline-maven-parent
CVE-2018-1331 Vulnerability in maven package org.apache.storm:storm-core