Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1500711 - (CVE-2017-16136) CVE-2017-16136 nodejs-method-override: Regular expression Denial of Service
CVE-2017-16136 nodejs-method-override: Regular expression Denial of Service
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170927,repor...
: Security
Depends On: 1500725 1500726 1500712 1500713
Blocks: 1500716
  Show dependency treegraph
 
Reported: 2017-10-11 07:16 EDT by Andrej Nemec
Modified: 2018-06-07 04:17 EDT (History)
13 users (show)

See Also:
Fixed In Version: nodejs-method-override 2.3.10
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-10-23 02:09:20 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2017-10-11 07:16:33 EDT
method-override is a module used by the Express.js framework to let you use HTTP verbs such as PUT or DELETE in places where the client doesn't support it.

method-override is vulnerable to a regular expression denial of service vulnerability when specially crafted input is passed in to be parsed via the X-HTTP-Method-Override header.

Upstream patch:

https://github.com/expressjs/method-override/commit/4c58835a61fdf7a8e070d6f8ecd5379a961d0987
Comment 1 Andrej Nemec 2017-10-11 07:17:00 EDT
Created nodejs-mime tracking bugs for this issue:

Affects: epel-all [bug 1500712]
Affects: fedora-all [bug 1500713]
Comment 2 Andrej Nemec 2017-10-11 07:40:30 EDT
Created nodejs-method-override tracking bugs for this issue:

Affects: epel-all [bug 1500725]
Affects: fedora-all [bug 1500726]

Note You need to log in before you can comment on or make changes to this bug.