Lucene search

K
prionPRIOn knowledge basePRION:CVE-2022-35948
HistoryAug 15, 2022 - 11:21 a.m.

Crlf injection

2022-08-1511:21:00
PRIOn knowledge base
www.prio-n.com
9
undici
http/1.1
node.js
crlf injection
headers
vulnerability
sanitize input
nvd

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.1%

undici is an HTTP/1.1 client, written from scratch for Node.js.=< [email protected] users are vulnerable to CRLF Injection on headers when using unsanitized input as request headers, more specifically, inside the content-type header. Example: import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) The above snippet will perform two requests in a single request API call: 1) http://localhost:3000/ 2) http://localhost:3000/foo2 This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.

CPENameOperatorVersion
undicilt5.8.2

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.1%