cve/2023/CVE-2023-26103.md
2024-06-18 02:51:15 +02:00

18 lines
896 B
Markdown

### [CVE-2023-26103](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26103)
![](https://img.shields.io/static/v1?label=Product&message=deno&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.31.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen)
### Description
Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server.
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970
#### Github
- https://github.com/dellalibera/dellalibera