Description
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
References (4)
Core 4
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e
Patch, Third Party Advisory x_refsource_misc
https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44
Third Party Advisory x_refsource_misc
https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2020/07/19/1
Scores
CVSS v3
7.5
EPSS
0.0071
EPSS Percentile
72.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-20
Status
published
Products (2)
npm/sails-hook-sockets
0 - 1.5.5npm
sailsjs/sails
< 1.0.0-46
Published
Jul 21, 2020
Tracked Since
Feb 18, 2026