phrity/websocket is vulnerable to Denial of Service (DoS)
25
Low Risk
New connections to a server managed by the phrity/websocket library have a small but intermittent chance of causing the server to enter an infinite loop. This results in 100% CPU usage and blocks all server operations, including handling both new and existing connections. The server remains unresponsive until it is manually restarted or a timeout handler is implemented and triggered. This issue occurs only during the processing of new connections and does not affect connections that are already established.
You are affected if you are using a version that falls within the vulnerable range.
phrity/websocket is vulnerable to Denial of Service (DoS) in versions 1.7.0 - 3.2.0.
Upgrade the phrity/websocket library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant