Vulnerability Description
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sailsjs | Sails | < 1.0.0-46 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2020/07/19/1Mailing ListThird Party Advisory
- https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb528PatchThird Party Advisory
- https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db484PatchThird Party Advisory
- https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82Third Party Advisory
- http://www.openwall.com/lists/oss-security/2020/07/19/1Mailing ListThird Party Advisory
- https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb528PatchThird Party Advisory
- https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db484PatchThird Party Advisory
- https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82Third Party Advisory
FAQ
What is CVE-2018-21036?
CVE-2018-21036 is a vulnerability with a CVSS score of 7.5 (HIGH). Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request...
How severe is CVE-2018-21036?
CVE-2018-21036 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-21036?
Check the references section above for vendor advisories and patch information. Affected products include: Sailsjs Sails.