icon

We found results for “

CVE-2022-35948

Good to know:

icon
icon

Date: August 12, 2022

undici is an HTTP/1.1 client, written from scratch for Node.js."=< undici@5.8.0" users are vulnerable to CRLF Injection on headers when using unsanitized input as request headers, more specifically, inside the "content-type" header. Example: "import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, })" The above snippet will perform two requests in a single "request" API call: 1) "http://localhost:3000/"; 2) "http://localhost:3000/foo2"; This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.

Language: JS

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of CRLF Sequences ('CRLF Injection')

CWE-93

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-74

Top Fix

icon

Upgrade Version

Upgrade to version undici - 5.8.2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us