Severity
5.3MEDIUM
EPSS
0.2%
top 62.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 15
Latest updateSep 23
Description
undici is an HTTP/1.1 client, written from scratch for Node.js.`=< [email protected]` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages4 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
2Debian▶
CVE-2022-35948: node-undici - undici is an HTTP/1.1 client, written from scratch for Node.js.`=< [email protected]`...↗2022