Denial of Servicehapi
hapi prior to 11.1.3 are affected by a denial of service vulnerability.
The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers.
This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hapi will continue to hold the socket open until timed out (default node timeout is 2 minutes).
Update to v11.1.3 or later
publishedAdvisory publishedDec 23rd, 2015
reportedInitial report by Adam BaldwinDec 23rd, 2015