CVE-2025-67731

N/A Unknown

📋 TL;DR

Servify Express versions before 1.2 have a denial-of-service vulnerability where attackers can send extremely large JSON request bodies, causing excessive memory usage, degraded performance, or process crashes. This affects any application using the package's default configuration and exposed to untrusted clients. The issue stems from missing request size limits in the JSON parser configuration.

💻 Affected Systems

Products:
  • servify-express
Versions: All versions before 1.2
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using servify-express with default configuration and exposed to untrusted clients.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage due to process crashes or memory exhaustion, making the application unavailable to legitimate users.

🟠

Likely Case

Degraded performance and intermittent service disruptions from memory pressure and CPU spikes processing oversized requests.

🟢

If Mitigated

Minimal impact with proper request size limits and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and uses simple oversized HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2

Vendor Advisory: https://github.com/Aarondoran/servify-express/security/advisories/GHSA-qgc4-8p88-4w7m

Restart Required: Yes

Instructions:

1. Update package.json to specify servify-express version 1.2 or higher. 2. Run 'npm update servify-express'. 3. Restart the application.

🔧 Temporary Workarounds

Add JSON parser limit

all

Manually configure Express JSON parser with size limit

app.use(express.json({ limit: '1mb' }))

NGINX reverse proxy limit

linux

Configure NGINX to limit request body size

client_max_body_size 1m;

🧯 If You Can't Patch

  • Implement rate limiting at application or reverse-proxy level
  • Deploy WAF rules to reject unusually large requests before parsing

🔍 How to Verify

Check if Vulnerable:

Check package.json for servify-express version below 1.2

Check Version:

npm list servify-express

Verify Fix Applied:

Verify servify-express version is 1.2 or higher in package.json and node_modules

📡 Detection & Monitoring

Log Indicators:

  • Unusually large request bodies in access logs
  • Memory usage spikes in application logs
  • Process restart events

Network Indicators:

  • Large HTTP POST requests to JSON endpoints
  • High bandwidth consumption from single sources

SIEM Query:

source="app_logs" AND (message="memory" OR message="crash") AND request_size>1000000

🔗 References

📤 Share & Export