Description
body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.
Problem types
CWE-400 Uncontrolled Resource Consumption
Product status
2.2.0 (semver)
Credits
Phillip Barta
Sebastian Beltran
Ulises Gascón
Chris de Almeida
Jean Burellier
References
github.com/...parser/security/advisories/GHSA-wqch-xfxh-vrr4