Useragent is used to parse useragent headers. It uses several regular expressions to accomplish this. An attacker could edit their own headers, creating an arbitrarily long useragent string, causing the event loop and server to block. This affects Useragent 2.1.12 and earlier.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://nodesecurity.io/advisories/312 | third party advisory exploit |