CVE-2023-24807

Severity
7.5HIGH
EPSS
0.3%
top 46.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 16

Description

Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5nodejs/undici< 5.19.1
NVDnodejs/undici< 5.19.1
Debiannode-undici< 5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1+2
npmundici< 5.19.1

Patches

🔴Vulnerability Details

4
OSV
Regular Expression Denial of Service in Headers2023-02-16
GHSA
Regular Expression Denial of Service in Headers2023-02-16
CVEList
Undici vulnerable to Regular Expression Denial of Service in Headers2023-02-16
OSV
CVE-2023-24807: Undici is an HTTP/12023-02-16

📋Vendor Advisories

3
Red Hat
Node.js: Regular Expression Denial of Service in Headers fetch API2023-02-16
Microsoft
Undici vulnerable to Regular Expression Denial of Service in Headers2023-02-14
Debian
CVE-2023-24807: node-undici - Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers....2023
CVE-2023-24807 (HIGH CVSS 7.5) | Undici is an HTTP/1.1 client for No | cvebase.io