Node.js X509Certificate API DoS via Invalid Public Key
CVE-2023-30588 Published on November 28, 2023

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

NVD


Products Associated with CVE-2023-30588

stack.watch emails you whenever new vulnerabilities are published in nodejs node.js or Canonical Ubuntu Linux. Just hit a watch button to start following.

 
 

Affected Versions

NodeJS Node:

Exploit Probability

EPSS
0.03%
Percentile
7.49%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.