Description
Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression.
Remediation
References
http://www.openwall.com/lists/oss-security/2016/02/20/1
http://www.openwall.com/lists/oss-security/2016/02/20/2
https://bugzilla.redhat.com/show_bug.cgi?id=1309721
https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa
https://github.com/hueniverse/hawk/issues/168
https://nodesecurity.io/advisories/77
Related Vulnerabilities
CVE-2023-25499 Vulnerability in maven package com.vaadin:flow-server
CVE-2021-22134 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2020-8158 Vulnerability in npm package typeorm
CVE-2017-2582 Vulnerability in maven package org.keycloak:keycloak-saml-core
CVE-2023-25571 Vulnerability in npm package @backstage/catalog-model