{ "schema_version": "1.4.0", "id": "GHSA-jcpv-g9rr-qxrc", "modified": "2021-09-14T19:39:20Z", "published": "2018-07-31T22:52:00Z", "aliases": [ "CVE-2016-2515" ], "summary": "Regular Expression Denial of Service in hawk", "details": "Versions of `hawk` prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's.\n\n\n\n## Recommendation\n\nUpdate to hawk version 4.1.1 or later.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "hawk" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "4.0.0" }, { "fixed": "4.1.1" } ] } ] }, { "package": { "ecosystem": "npm", "name": "hawk" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.1.3" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2515" }, { "type": "WEB", "url": "https://github.com/hueniverse/hawk/issues/168" }, { "type": "WEB", "url": "https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1309721" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-jcpv-g9rr-qxrc" }, { "type": "PACKAGE", "url": "https://github.com/hueniverse/hawk" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/77" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/02/20/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/02/20/2" } ], "database_specific": { "cwe_ids": [ "CWE-1333" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:43:06Z", "nvd_published_at": null } }