CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS
Percentile
71.6%
Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync
attacks and deliver malicious payloads to unsuspecting users. The payloads
can be crafted by an attacker to hijack user sessions, poison cookies,
perform clickjacking, and a multitude of other attacks depending on the
architecture of the underlying system. The attack was possible due to a bug
in processing of carrier-return symbols in the HTTP header names.
hackerone.com/reports/922597
launchpad.net/bugs/cve/CVE-2020-8201
nodejs.org/en/blog/vulnerability/september-2020-security-releases/
nodejs.org/en/blog/vulnerability/september-2020-security-releases/#http-request-smuggling-due-to-cr-to-hyphen-conversion-high-cve-2020-8201
nvd.nist.gov/vuln/detail/CVE-2020-8201
security-tracker.debian.org/tracker/CVE-2020-8201
www.cve.org/CVERecord?id=CVE-2020-8201
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS
Percentile
71.6%