Description
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.5Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: Low
Integrity: Low
Availability: None
Affected Packages5 packages
▶Debiannode-undici< 5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1+2 🔴Vulnerability Details
4OSVCVE-2023-23936: Undici is an HTTP/1↗2023-02-16 ▶ CVEListCRLF Injection in Nodejs ‘undici’ via host↗2023-02-16 ▶ GHSACRLF Injection in Nodejs ‘undici’ via host↗2023-02-16 ▶ OSVCRLF Injection in Nodejs ‘undici’ via host↗2023-02-16 ▶ 📋Vendor Advisories
3Red HatNode.js: Fetch API did not protect against CRLF injection in host headers↗2023-02-16 ▶ MicrosoftCRLF Injection in Nodejs ‘undici’ via host↗2023-02-14 ▶ DebianCVE-2023-23936: node-undici - Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior ...↗2023 ▶