CVE-2021-32640

ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ws_project:ws:*:*:*:*:*:node.js:*:*
cpe:2.3:a:ws_project:ws:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff - Patch, Third Party Advisory () https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff - Patch, Third Party Advisory
References () https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 - Exploit, Mitigation, Patch, Third Party Advisory () https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 - Exploit, Mitigation, Patch, Third Party Advisory
References () https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E - () https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E -
References () https://security.netapp.com/advisory/ntap-20210706-0005/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210706-0005/ - Third Party Advisory

07 Nov 2023, 03:35

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E', 'name': '[tinkerpop-commits] 20210701 [tinkerpop] 01/03: Bumped ws to 6.2.2 to address CVE-2021-32640 CTR', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E -

Information

Published : 2021-05-25 19:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32640

Mitre link : CVE-2021-32640

CVE.ORG link : CVE-2021-32640


JSON object : View

Products Affected

netapp

  • e-series_performance_analyzer

ws_project

  • ws
CWE
CWE-400

Uncontrolled Resource Consumption