[NPM:GHSA-3CVR-822R-RQCC] undici before v5.8.0 vulnerable to CRLF injection in request headers
Severity
Moderate
Affected Packages
1
Fixed Packages
1
CVEs
1
Impact
It is possible to inject CRLF sequences into request headers in Undici.
```js
const undici = require('undici')
const response = undici.request("http://127.0.0.1:1000", {
headers: {'a': "\r\nb"}
})
```
The same applies to path
and method
Patches
Update to v5.8.0
Workarounds
Sanitize all HTTP headers from untrusted sources to eliminate \r\n
.
References
https://hackerone.com/reports/409943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12116
For more information
If you have any questions or comments about this advisory:
- Open an issue in undici repository
- To make a report, follow the SECURITY document
Package | Affected Version |
---|---|
pkg:npm/undici | < 5.8.0 |
Package | Fixed Version |
---|---|
pkg:npm/undici | = 5.8.0 |
- ID
- NPM:GHSA-3CVR-822R-RQCC
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-3cvr-822r-rqcc
- Published
-
2022-07-21T20:30:10
(2 years ago) - Modified
-
2023-01-27T05:02:07
(20 months ago) - Rights
- NPM Security Team
- Other Advisories
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |