Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.
History

Wed, 23 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-05-05T22:55:10.000Z

Updated: 2025-04-23T18:30:44.456Z

Reserved: 2022-04-13T00:00:00.000Z

Link: CVE-2022-29167

cve-icon Vulnrichment

Updated: 2024-08-03T06:17:54.086Z

cve-icon NVD

Status : Modified

Published: 2022-05-05T23:15:09.083

Modified: 2024-11-21T06:58:37.553

Link: CVE-2022-29167

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-05-06T00:00:00Z

Links: CVE-2022-29167 - Bugzilla