Search for vulnerabilities
Vulnerability ID | VCID-tmc9-1ebt-aaas |
Aliases |
CVE-2013-4450
|
Summary | The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 6.2 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
CWE-20 | Improper Input Validation |
Data source | Metasploit |
---|---|
Description | This module exploits a Denial of Service (DoS) condition in the HTTP parser of Node.js versions released before 0.10.21 and 0.8.26. The attack sends many pipelined HTTP requests on a single connection, which causes unbounded memory allocation when the client does not read the responses. |
Note | Stability: - crash-service-down SideEffects: [] Reliability: [] |
Ransomware campaign use | Unknown |
Source publication date | Oct. 18, 2013 |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/http/nodejs_pipelining.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.94897 |
EPSS Score | 0.09367 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |