Description
The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.
Remediation
References
https://github.com/node-opcua/node-opcua/commit/33ca3bab4ab781392a2f8d8f5a14de9a0aa0e410
https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723
https://github.com/node-opcua/node-opcua/pull/1149
https://github.com/node-opcua/node-opcua/commit/dbcb5d5191118c22ee9c89332a94b94e6553d76b
Related Vulnerabilities
CVE-2022-43428 Vulnerability in maven package com.compuware.jenkins:compuware-topaz-for-total-test
CVE-2021-3632 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2021-4264 Vulnerability in maven package org.webjars:dustjs-linkedin
CVE-2022-25912 Vulnerability in maven package org.webjars.npm:simple-git
CVE-2021-28165 Vulnerability in maven package org.eclipse.jetty:jetty-io