Description
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.
Remediation
References
https://nodesecurity.io/advisories/120
https://github.com/nodejs/node/issues/7388
Related Vulnerabilities
CVE-2020-2165 Vulnerability in maven package org.jenkins-ci.plugins:artifactory
CVE-2023-44487 Vulnerability in maven package io.helidon.http:helidon-http-http2
CVE-2019-1003089 Vulnerability in maven package ren.helloworld:upload-pgyer
CVE-2019-10355 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2018-1306 Vulnerability in maven package org.apache.portals.pluto:portletv3annotateddemo