This week, NodeJS project has released fixes for a DoS vulnerability, CVE-2020-8277, that could be triggered via DNS requests.
An attacker could exploit this flaw in a Node.js app that enabled users to make DNS requests to cause a Denial of Service (DoS) condition.
By performing DNS lookups for a hostname or domain of the attacker’s choice that returns exceptionally large responses, the vulnerable Node.js application could be crashed.
“A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of service by getting the application to resolve a DNS record with a larger number of responses,” states NodeJS security advisory.
At the time of writing, it appears, the HackerOne bug report for this vulnerability is still awaiting public disclosure.
The flaw impacts following Node.js versions:
The NodeJS project has issued fixes for CVE-2020-8277 in the following versions:
Users are advised to upgrade to fixed versions immediately to safeguard their Node.js applications against vulnerablilities like these.
In 2021, parking app ParkMobile suffered a massive data breach impacting 22 million users whose…
When I first got into cybersecurity, I thought it was all about hackers in hoodies…
The US Air Force is investigating a “privacy-related issue” that may have exposed personally identifiable…
London’s iconic department store Harrods has disclosed that approximately 430,000 customer records were compromised in…
WestJet confirmed that in a June 2025 cybersecurity incident, a “sophisticated, criminal third party” gained…
Imagine getting an email straight from GitHub’s own notification system: the same one you've trusted…
This website uses cookies.