CVE-2022-29167

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
GitHub_MCNA
7.4 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 27%
VendorProductVersion
mozillahawk
𝑥
< 9.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
node-hawk
bullseye
8.0.1+dfsg-2+deb11u1
fixed
sid
9.0.1-1
fixed
trixie
9.0.1-1
fixed
bookworm
9.0.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
node-hawk
lunar
not-affected
kinetic
Fixed 8.0.1+dfsg-1ubuntu0.22.10.1
released
jammy
Fixed 8.0.1+dfsg-1ubuntu0.22.04.1
released
focal
Fixed 7.1.2+dfsg-1ubuntu0.1
released
bionic
Fixed 6.0.1+dfsg-1+deb10u1build0.18.04.1
released
xenial
ignored
trusty
ignored