5
CVSSv2

CVE-2020-7693

Published: 09/07/2020 Updated: 12/07/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs prior to 0.3.20.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sockjs project sockjs

Github Repositories

CVE-2020-7693: SockJS 0.3.19 Denial of Service POC

CVE-2020-7693: Meteor <1102 SockJS 0319 Denial of Service POC Author: Andrew Snow SockJS v0319 calls resend instead of reswrite when receiving websocket upgrade requests This causes an Error [ERR_STREAM_WRITE_AFTER_END]: write after end which crashes the container running the app utilising the vulnerable SockJS Vulnerable versions affected: Meteor JS <1