CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS
Percentile
48.6%
It is possible to inject CRLF sequences into request headers in Undici.
const undici = require('undici')
const response = undici.request("http://127.0.0.1:1000", {
headers: {'a': "\r\nb"}
})
The same applies to path
and method
Update to v5.8.0
Sanitize all HTTP headers from untrusted sources to eliminate \r\n
.
https://hackerone.com/reports/409943
https://vulners.com/cve/CVE-2018-12116
If you have any questions or comments about this advisory:
github.com/nodejs/undici
github.com/nodejs/undici/commit/a29a151d0140d095742d21a004023d024fe93259
github.com/nodejs/undici/releases/tag/v5.8.0
github.com/nodejs/undici/security/advisories/GHSA-3cvr-822r-rqcc
hackerone.com/reports/409943
nvd.nist.gov/vuln/detail/CVE-2022-31150
security.netapp.com/advisory/ntap-20220915-0002
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS
Percentile
48.6%