{
  "threat_severity" : "Low",
  "public_date" : "2023-02-16T00:00:00Z",
  "bugzilla" : {
    "description" : "Node.js: Regular Expression Denial of Service in Headers fetch API",
    "id" : "2172204",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2172204"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-1333",
  "details" : [ "Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-04-04T00:00:00Z",
    "advisory" : "RHSA-2023:1582",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "nodejs:16-8070020230314140722.bd1311ed"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-04-04T00:00:00Z",
    "advisory" : "RHSA-2023:1583",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "nodejs:18-8070020230322080930.bd1311ed"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2654",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "nodejs:18-9020020230327152102.rhel9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2655",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "nodejs-1:16.19.1-1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Extended Update Support",
    "release_date" : "2023-10-09T00:00:00Z",
    "advisory" : "RHSA-2023:5533",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.0",
    "package" : "nodejs-1:16.20.2-1.el9_0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat 3scale API Management Platform 2",
    "fix_state" : "Fix deferred",
    "package_name" : "3scale-amp-system-container",
    "cpe" : "cpe:/a:redhat:red_hat_3scale_amp:2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "nodejs",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-24807\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-24807" ],
  "name" : "CVE-2023-24807",
  "csaw" : false
}