Lucene search

K
githubGitHub Advisory DatabaseGHSA-M4V8-WQVR-P9F7
HistoryApr 04, 2024 - 2:20 p.m.

Undici's Proxy-Authorization header not cleared on cross-origin redirect for dispatch, request, stream, pipeline

2024-04-0414:20:39
CWE-200
CWE-285
GitHub Advisory Database
github.com
28
undici
proxy-authorization
cross-origin
redirect
dispatch
request
stream
pipeline
fix
workaround
maxredirections
security advisory
vulnerability
nodejs
hackerone
github

CVSS3

3.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

AI Score

7.2

Confidence

High

EPSS

0

Percentile

10.3%

Impact

Undici cleared Authorization and Proxy-Authorization headers for fetch(), but did not clear them for undici.request().

Patches

This has been patched in https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75.
Fixes has been released in v5.28.4 and v6.11.1.

Workarounds

use fetch() or disable maxRedirections.

References

Linzi Shang reported this.

Affected configurations

Vulners
Node
undiciRange<6.11.1
OR
undiciRange<5.28.4
VendorProductVersionCPE
*undici*cpe:2.3:a:*:undici:*:*:*:*:*:*:*:*

CVSS3

3.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

AI Score

7.2

Confidence

High

EPSS

0

Percentile

10.3%