logo

CVE-2022-21667 @soketi/soketi

Package

Manager: npm
Name: @soketi/soketi
Vulnerable Version: >=0 <0.24.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00538 pctl0.66563

Details

Denial of Service in soketi ### Impact _What kind of vulnerability is it? Who is impacted?_ There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simply just crash the server for trying to send a response after the request closed. All users that run the server are affected by it and it's highly recommended to upgrade to the latest patch. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Updating to at least 0.24.1 or the latest version. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No. Upgrading is the only solution. ### References _Are there any links users can visit to find out more?_ https://github.com/soketi/soketi/releases/tag/0.24.1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the issues board](https://github.com/soketi/soketi/issues) * Email us at [alex@renoki.org](mailto:alex@renoki.org)

Metadata

Created: 2022-01-08T00:24:44Z
Modified: 2022-01-18T22:37:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-86ch-6w7v-v6xf/GHSA-86ch-6w7v-v6xf.json
CWE IDs: ["CWE-755"]
Alternative ID: GHSA-86ch-6w7v-v6xf
Finding: F096
Auto approve: 1