charset

Regular Expression Denial of Service

Severity: moderate

Overview

Affected versions of charset are susceptible to a regular expression denial of service.

The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.

If node was compiled using the -DHTTP_MAX_HEADER_SIZE however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.

Remediation

Update to version 1.0.1 or later.

Vulnerable versions

0.0.1
6 years ago
0.0.2
5 years ago
0.1.0
4 years ago

Unaffected versions

1.0.0
4 years ago
1.0.1
a year ago

Resources

Advisory timeline

  1. Published

    Advisory published
    Sep 8th, 2017
  2. Reported

    Initial report by Cristian-Alexandru Staicu
    Sep 8th, 2017