Debian Security Advisory
DLA-3246-1 node-hawk -- LTS security update
- Date Reported:
- 23 Dec 2022
- Affected Packages:
- node-hawk
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2022-29167.
- More information:
-
It was discovered that there was an issue in Hawk, an HTTP authentication scheme. Hawk used a regular expression to parse `Host` HTTP headers which was subject to regular expression DoS attack. Each added character in the attacker's input increased the computation time exponentially.
- CVE-2022-29167
Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.
For Debian 10
Buster
, this problem has been fixed in version 6.0.1+dfsg-1+deb10u1.We recommend that you upgrade your node-hawk packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2022-29167