GMS-2017-210: Regular Expression Denial of Service
The tough-cookie
module is vulnerable to regular expression denial of service. Input of around k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE=
option the default header max length is kb so the impact of the ReDoS is limited to around seconds of blocking.
References
Detect and mitigate GMS-2017-210 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →