Description
charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
Remediation
References
https://github.com/node-modules/charset/issues/10
https://nodesecurity.io/advisories/524
Related Vulnerabilities
CVE-2022-0841 Vulnerability in npm package npm-lockfile
CVE-2022-39299 Vulnerability in npm package @node-saml/passport-saml
CVE-2021-4231 Vulnerability in npm package @angular/core
CVE-2022-25842 Vulnerability in maven package com.alibaba.oneagent:one-java-agent-plugin
CVE-2019-10349 Vulnerability in maven package org.jenkins-ci.plugins:depgraph-view