CVE-2022-29167

EUVD-2022-2298
Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.4 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
GitHub_MCNA
7.4 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
Affected Products (NVD)
VendorProductVersion
mozillahawk
𝑥
< 9.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
node-hawk
bookworm
9.0.1-1
fixed
bullseye
8.0.1+dfsg-2+deb11u1
fixed
sid
9.0.1-1
fixed
trixie
9.0.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
node-hawk
bionic
Fixed 6.0.1+dfsg-1+deb10u1build0.18.04.1
released
focal
Fixed 7.1.2+dfsg-1ubuntu0.1
released
jammy
Fixed 8.0.1+dfsg-1ubuntu0.22.04.1
released
kinetic
Fixed 8.0.1+dfsg-1ubuntu0.22.10.1
released
lunar
not-affected
trusty
ignored
xenial
ignored