This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
References
Link | Resource |
---|---|
https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83 | Broken Link |
https://security.netapp.com/advisory/ntap-20230622-0008/ | |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332 | Exploit Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783 | Exploit Third Party Advisory |
https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83 | Broken Link |
https://security.netapp.com/advisory/ntap-20230622-0008/ | |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332 | Exploit Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Feb 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. |
Information
Published : 2023-01-31 05:15
Updated : 2025-03-27 18:17
NVD link : CVE-2022-25881
Mitre link : CVE-2022-25881
CVE.ORG link : CVE-2022-25881
JSON object : View
Products Affected
http-cache-semantics_project
- http-cache-semantics
CWE
CWE-1333
Inefficient Regular Expression Complexity