Lucene search

K
cveGitHub_MCVE-2024-30261
HistoryApr 04, 2024 - 3:15 p.m.

CVE-2024-30261

2024-04-0415:15:39
CWE-284
GitHub_M
web.nvd.nist.gov
51
undici http/1.1 client
node.js
integrity option
fetch()
vulnerability patched

CVSS3

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N

AI Score

3.9

Confidence

High

EPSS

0

Percentile

10.3%

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the integrity option passed to fetch(), allowing fetch() to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

Affected configurations

Vulners
Vulnrichment
Node
nodejsundiciRange6.0.06.11.1
OR
nodejsundiciRange<5.28.4
VendorProductVersionCPE
nodejsundici*cpe:2.3:a:nodejs:undici:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "nodejs",
    "product": "undici",
    "versions": [
      {
        "version": ">= 6.0.0, < 6.11.1",
        "status": "affected"
      },
      {
        "version": "< 5.28.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N

AI Score

3.9

Confidence

High

EPSS

0

Percentile

10.3%