Description
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0552 | Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request. |
Github GHSA |
GHSA-f7f4-hqp2-7prc | Improper Input Validation in sails-hook-sockets |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:19:27.445Z
Reserved: 2020-03-14T00:00:00.000Z
Link: CVE-2018-21036
No data.
Status : Modified
Published: 2020-07-21T14:15:13.067
Modified: 2024-11-21T04:02:45.030
Link: CVE-2018-21036
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA