The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.
References
Link | Resource |
---|---|
https://nodesecurity.io/advisories/28 | Third Party Advisory |
https://nodesecurity.io/advisories/28 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://nodesecurity.io/advisories/28 - Third Party Advisory |
Information
Published : 2018-05-31 20:29
Updated : 2024-11-21 02:03
NVD link : CVE-2014-10064
Mitre link : CVE-2014-10064
CVE.ORG link : CVE-2014-10064
JSON object : View
Products Affected
qs_project
- qs