Lucene search

K
cveGitHub_MCVE-2024-30260
HistoryApr 04, 2024 - 4:15 p.m.

CVE-2024-30260

2024-04-0416:15:08
CWE-285
GitHub_M
web.nvd.nist.gov
41
undici
http/1.1
vulnerability
patched
versions

CVSS3

3.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

10.3%

Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for fetch(), but did not clear them for undici.request(). This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

Affected configurations

Vulners
Node
nodejsundiciRange<5.28.4
OR
nodejsundiciRange6.0.06.11.1
VendorProductVersionCPE
nodejsundici*cpe:2.3:a:nodejs:undici:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "nodejs",
    "product": "undici",
    "versions": [
      {
        "version": "< 5.28.4",
        "status": "affected"
      },
      {
        "version": ">= 6.0.0, < 6.11.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

10.3%