Debian Security Advisory

DLA-3246-1 node-hawk -- LTS security update

Date Reported:
23 Dec 2022
Affected Packages:
node-hawk
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2022-29167.
More information:

It was discovered that there was an issue in Hawk, an HTTP authentication scheme. Hawk used a regular expression to parse `Host` HTTP headers which was subject to regular expression DoS attack. Each added character in the attacker's input increased the computation time exponentially.

  • CVE-2022-29167

    Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.

For Debian 10 Buster, this problem has been fixed in version 6.0.1+dfsg-1+deb10u1.

We recommend that you upgrade your node-hawk packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS