Vulnerability Description
charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Charset Project | Charset | < 1.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/node-modules/charset/issues/10ExploitThird Party Advisory
- https://nodesecurity.io/advisories/524Third Party Advisory
- https://github.com/node-modules/charset/issues/10ExploitThird Party Advisory
- https://nodesecurity.io/advisories/524Third Party Advisory
FAQ
What is CVE-2017-16098?
CVE-2017-16098 is a vulnerability with a CVSS score of 7.5 (HIGH). charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTT...
How severe is CVE-2017-16098?
CVE-2017-16098 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16098?
Check the references section above for vendor advisories and patch information. Affected products include: Charset Project Charset.