CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
80.9%
The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.
Vendor | Product | Version | CPE |
---|---|---|---|
nodejs | nodejs | * | cpe:2.3:a:nodejs:nodejs:*:*:*:*:*:*:*:* |
nodejs | nodejs | 0.7.0 | cpe:2.3:a:nodejs:nodejs:0.7.0:*:*:*:*:*:*:* |
nodejs | nodejs | 0.7.1 | cpe:2.3:a:nodejs:nodejs:0.7.1:*:*:*:*:*:*:* |
nodejs | nodejs | 0.7.2 | cpe:2.3:a:nodejs:nodejs:0.7.2:*:*:*:*:*:*:* |
nodejs | nodejs | 0.7.3 | cpe:2.3:a:nodejs:nodejs:0.7.3:*:*:*:*:*:*:* |
nodejs | nodejs | 0.7.4 | cpe:2.3:a:nodejs:nodejs:0.7.4:*:*:*:*:*:*:* |
nodejs | nodejs | 0.7.5 | cpe:2.3:a:nodejs:nodejs:0.7.5:*:*:*:*:*:*:* |
nodejs | nodejs | 0.7.6 | cpe:2.3:a:nodejs:nodejs:0.7.6:*:*:*:*:*:*:* |
nodejs | nodejs | 0.7.7 | cpe:2.3:a:nodejs:nodejs:0.7.7:*:*:*:*:*:*:* |
blog.nodejs.org/2012/05/04/version-0-6-17-stable/
secunia.com/advisories/49066
www.openwall.com/lists/oss-security/2012/05/08/4
www.openwall.com/lists/oss-security/2012/05/08/8
github.com/joyent/node/commit/7b3fb22
github.com/joyent/node/commit/c9a231d
support.f5.com/csp/article/K99038439?utm_source=f5support&%3Butm_medium=RSS