Node.js X509Certificate API DoS via Invalid Public Key
CVE-2023-30588 Published on November 28, 2023

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

NVD


Products Associated with CVE-2023-30588

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-30588 are published in these products:

 
 

Affected Versions

NodeJS Node:

Exploit Probability

EPSS
0.03%
Percentile
7.35%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.