CVE-2024-37890

Source
https://cve.org/CVERecord?id=CVE-2024-37890
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-37890.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-37890
Aliases
Downstream
Related
Published
2024-06-17T19:09:02.127Z
Modified
2026-05-18T12:03:10.145179086Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of service when handling a request with many HTTP headers in ws
Details

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

Database specific
{
    "cwe_ids": [
        "CWE-476"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/37xxx/CVE-2024-37890.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/websockets/ws

Affected ranges

Type
GIT
Repo
https://github.com/websockets/ws
Events

Affected versions

8.*
8.0.0
8.1.0
8.10.0
8.11.0
8.12.0
8.12.1
8.13.0
8.14.0
8.14.1
8.14.2
8.15.0
8.15.1
8.16.0
8.17.0
8.2.0
8.2.1
8.2.2
8.2.3
8.3.0
8.4.0
8.4.1
8.4.2
8.5.0
8.6.0
8.7.0
8.8.0
8.8.1
8.9.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-37890.json"