Miggo Logo

CVE-2014-10064: Denial-of-Service Extended Event Loop Blocking in qs

5

CVSS Score

Basic Information

EPSS Score
0.6738%
Published
10/9/2018
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
qsnpm< 1.0.01.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from uncontrolled recursion in the parsing logic when handling nested structures. While no patch diffs are available, all advisories explicitly identify the core parsing functionality (qs.parse) as the vulnerable component. In Node.js runtime profiling, recursive calls to qs.parse (and potentially its internal helpers) would dominate the stack trace when processing a malicious payload. The lack of depth-limiting logic in pre-1.0.0 versions makes this the primary vulnerable function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions prior to *.*.* o* `qs` *r* *****t** *y * **ni*l o* s*rvi** vuln*r**ility t**t r*sults *rom *x**ssiv* r**ursion in p*rsin* * ***ply n*st** JSON strin*. ## R**omm*n**tion Up**t* to v*rsion *.*.* or l*t*r

Reasoning

T** vuln*r**ility st*ms *rom un*ontroll** r**ursion in t** p*rsin* lo*i* w**n **n*lin* n*st** stru*tur*s. W*il* no p*t** *i**s *r* *v*il**l*, *ll **visori*s *xpli*itly i**nti*y t** *or* p*rsin* *un*tion*lity (`qs.p*rs*`) *s t** vuln*r**l* *ompon*nt.