Vulnerabilities > CVE-2020-7693 - Improper Handling of Exceptional Conditions vulnerability in Sockjs Project Sockjs
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
LOW Summary
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/andsnw/sockjs-dos-py
- https://github.com/andsnw/sockjs-dos-py
- https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16
- https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16
- https://github.com/sockjs/sockjs-node/issues/252
- https://github.com/sockjs/sockjs-node/issues/252
- https://github.com/sockjs/sockjs-node/pull/265
- https://github.com/sockjs/sockjs-node/pull/265
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448
- https://snyk.io/vuln/SNYK-JS-SOCKJS-575261
- https://snyk.io/vuln/SNYK-JS-SOCKJS-575261