<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>@Fastify/Accepts-Serializer (&lt;= 6.0.3) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/@fastify/accepts-serializer--6.0.3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 17:13:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/@fastify/accepts-serializer--6.0.3/feed.xml" rel="self" type="application/rss+xml"/><item><title>Fastify accepts-serializer Denial of Service via Unbounded Accept Header Cache Growth</title><link>https://feed.craftedsignal.io/briefs/2024-01-fastify-dos/</link><pubDate>Fri, 08 May 2026 17:13:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-fastify-dos/</guid><description>The @fastify/accepts-serializer package is vulnerable to a denial of service (DoS) attack due to unbounded cache growth, where an attacker can send many distinct Accept header variants, causing the cache to grow unbounded, exhausting the Node.js heap, and crashing the process.</description><content:encoded><![CDATA[<p>The <code>@fastify/accepts-serializer</code> package, versions 6.0.3 and earlier, is susceptible to a denial-of-service (DoS) vulnerability. This vulnerability arises from the package&rsquo;s caching mechanism for serializer-selection results, which are keyed by the request&rsquo;s <code>Accept</code> header. The cache lacks both a size limit and an eviction policy, making it vulnerable to unbounded growth. An unauthenticated attacker can exploit this by sending numerous distinct <code>Accept</code> header variants. Under sustained load, this can exhaust the Node.js heap memory, ultimately causing the process to crash. Defenders should upgrade to version 6.0.4 or later where the cache is bounded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Fastify application utilizing the <code>@fastify/accepts-serializer</code> package version 6.0.3 or earlier.</li>
<li>The attacker crafts HTTP requests with unique variations of the <code>Accept</code> header.</li>
<li>These requests are sent to the target Fastify application.</li>
<li>The <code>@fastify/accepts-serializer</code> package caches the serializer selection result based on the unique <code>Accept</code> header received in each request.</li>
<li>The attacker floods the application with a high volume of requests, each containing a slightly different <code>Accept</code> header.</li>
<li>The cache grows without bounds, consuming an increasing amount of memory.</li>
<li>The Node.js heap becomes exhausted due to the unbounded cache growth.</li>
<li>The Fastify application crashes, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition, rendering the affected Fastify application unavailable. The impact depends on the criticality of the application; a critical service outage can cause significant disruption and financial losses. While the exact number of affected applications is unknown, any Fastify application using a vulnerable version of <code>@fastify/accepts-serializer</code> is susceptible. An attacker can trigger the crash with a relatively small number of requests per second, making detection challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>@fastify/accepts-serializer</code> version 6.0.4 or later to patch CVE-2026-7768.</li>
<li>Monitor web server logs for a sudden increase in requests with diverse <code>Accept</code> headers, using a rule based on the <code>webserver</code> category, to detect potential exploitation attempts.</li>
<li>Implement resource monitoring on systems running Fastify applications to detect abnormal memory usage patterns indicative of the DoS attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>denial-of-service</category><category>fastify</category></item></channel></rss>