Skip to content

DoS vulnerability for apps with sockets enabled

High severity GitHub Reviewed Published Jul 27, 2023 in balderdashy/sails • Updated Nov 6, 2023

Package

npm sails (npm)

Affected versions

< 1.5.7

Patched versions

1.5.7

Description

Impact

In Sails apps <=v1.5.6, an attacker can send a virtual request that will cause the node process to crash.

Patches

This behavior was fixed in Sails v1.5.7

Workarounds

Disable the sockets hook and remove the sails.io.js client

References

balderdashy/sails#7287

Big thanks to @ThomasRinsma at Codean!

References

@eashaw eashaw published to balderdashy/sails Jul 27, 2023
Published to the GitHub Advisory Database Jul 27, 2023
Reviewed Jul 27, 2023
Published by the National Vulnerability Database Jul 27, 2023
Last updated Nov 6, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2023-38504

GHSA ID

GHSA-gpw9-fwm8-7rx7

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.