CVE-2021-32640

ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ws_project:ws:*:*:*:*:*:node.js:*:*
cpe:2.3:a:ws_project:ws:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:35

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E', 'name': '[tinkerpop-commits] 20210701 [tinkerpop] 01/03: Bumped ws to 6.2.2 to address CVE-2021-32640 CTR', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E -

04 Jun 2022, 02:13

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210706-0005/ - Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E - Mailing List, Patch, Third Party Advisory
CPE cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
First Time Netapp e-series Performance Analyzer
Netapp

06 Jul 2021, 08:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E -

02 Jun 2021, 16:50

Type Values Removed Values Added
References (MISC) https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff - (MISC) https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff - Patch, Third Party Advisory
References (CONFIRM) https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 - (CONFIRM) https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 - Exploit, Mitigation, Patch, Third Party Advisory
CPE cpe:2.3:a:ws_project:ws:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3

25 May 2021, 20:00

Type Values Removed Values Added
CWE CWE-400

25 May 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-25 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32640

Mitre link : CVE-2021-32640

CVE.ORG link : CVE-2021-32640


JSON object : View

Products Affected

ws_project

  • ws

netapp

  • e-series_performance_analyzer
CWE
CWE-400

Uncontrolled Resource Consumption