This week, NodeJS project has released fixes for a DoS vulnerability, CVE-2020-8277, that could be triggered via DNS requests.
An attacker could exploit this flaw in a Node.js app that enabled users to make DNS requests to cause a Denial of Service (DoS) condition.
By performing DNS lookups for a hostname or domain of the attacker’s choice that returns exceptionally large responses, the vulnerable Node.js application could be crashed.
“A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of service by getting the application to resolve a DNS record with a larger number of responses,” states NodeJS security advisory.
At the time of writing, it appears, the HackerOne bug report for this vulnerability is still awaiting public disclosure.
The flaw impacts following Node.js versions:
The NodeJS project has issued fixes for CVE-2020-8277 in the following versions:
Users are advised to upgrade to fixed versions immediately to safeguard their Node.js applications against vulnerablilities like these.
Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the…
Rogue WordPress Plugin Found to Steal Credit Card Information in Magecart Campaign Threat hunters have…
The Assembly of the Republic of Albania and telecom company One Albania have recently fallen…
The banking malware Carbanak has resurfaced with updated tactics, incorporating attack vendors and techniques to…
One of the world's largest theme park operators, Parques Reunidos has disclosed a cybersecurity incident.…
Phishing kit used by multiple hacked sites generates a log in page on the fly…
This website uses cookies.