This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
References
Link | Resource |
---|---|
https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783 | Exploit Third Party Advisory |
https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83 | Broken Link |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-01-30 21:15
Updated : 2023-02-07 09:07
NVD link : CVE-2022-25881
Mitre link : CVE-2022-25881
JSON object : View
CWE
CWE-1333
Inefficient Regular Expression Complexity
Products Affected
http-cache-semantics_project
- http-cache-semantics