Description
Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression.
Remediation
References
http://www.openwall.com/lists/oss-security/2016/02/20/1
http://www.openwall.com/lists/oss-security/2016/02/20/2
https://bugzilla.redhat.com/show_bug.cgi?id=1309721
https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa
https://github.com/hueniverse/hawk/issues/168
https://nodesecurity.io/advisories/77
Related Vulnerabilities
CVE-2020-36182 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2020-6426 Vulnerability in npm package electron
CVE-2021-23497 Vulnerability in npm package @strikeentco/set
CVE-2022-36083 Vulnerability in npm package jose-browser-runtime
CVE-2017-12617 Vulnerability in maven package org.apache.tomcat:tomcat-util