Duplicate advisory: Deno vulnerable to Regular Expression Denial of Service
High severity
GitHub Reviewed
Published
Feb 25, 2023
to the GitHub Advisory Database
•
Updated Apr 3, 2023
Withdrawn
This advisory was withdrawn on Apr 3, 2023
Description
Published by the National Vulnerability Database
Feb 25, 2023
Published to the GitHub Advisory Database
Feb 25, 2023
Reviewed
Feb 28, 2023
Withdrawn
Apr 3, 2023
Last updated
Apr 3, 2023
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-jc97-h3h9-7xh6. This link is maintained to preserve external references.
Original Description
Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server. This issue has been patched in version 1.31.0.
References