Description
The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.
Remediation
References
https://nodesecurity.io/advisories/28
Related Vulnerabilities
CVE-2018-1000844 Vulnerability in maven package com.squareup.retrofit2:converter-jaxb
CVE-2022-23710 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2020-2193 Vulnerability in maven package io.jenkins.plugins:echarts-api
CVE-2023-37903 Vulnerability in npm package vm2
CVE-2012-0803 Vulnerability in maven package org.apache.cxf:cxf-rt-ws-security