undici@5.9.0 vulnerabilities

An HTTP/1.1 client, written from scratch for Node.js

  • latest version

    7.16.0

  • latest non vulnerable version

  • first published

    7 years ago

  • latest version published

    2 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the undici package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Missing Release of Memory after Effective Lifetime

    undici is an An HTTP/1.1 client, written from scratch for Node.js

    Affected versions of this package are vulnerable to Missing Release of Memory after Effective Lifetime due to improper handling of invalid certificate data. An attacker can cause a memory leak by setting up a server with a bad certificate and inducing the application to repeatedly call a webhook-like system.

    How to fix Missing Release of Memory after Effective Lifetime?

    Upgrade undici to version 5.29.0, 6.21.2, 7.5.0 or higher.

    <5.29.0>=6.0.0 <6.21.2>=7.0.0 <7.5.0
    • H
    Insecure Randomness

    undici is an An HTTP/1.1 client, written from scratch for Node.js

    Affected versions of this package are vulnerable to Insecure Randomness due to the use of Math.random(), an insufficiently random value generator, for boundary selection in multipart/form-data requests. An attacker can predict the boundary values and manipulate multipart requests by intercepting and analyzing multiple requests to deduce the random generator pattern.

    Note:

    This is only exploitable if multipart requests are sent to an attacker-controlled server.

    How to fix Insecure Randomness?

    Upgrade undici to version 5.28.5, 6.21.1, 7.2.3 or higher.

    >=4.5.0 <5.28.5>=6.0.0 <6.21.1>=7.0.0 <7.2.3
    • L
    Improper Authorization

    undici is an An HTTP/1.1 client, written from scratch for Node.js

    Affected versions of this package are vulnerable to Improper Authorization due to improper handling of Proxy-Authorization headers during cross-origin redirects in certain methods. An attacker can exploit this behavior by inducing a victim to make a request that triggers a cross-origin redirect, potentially leaking sensitive information contained in the Proxy-Authorization header.

    How to fix Improper Authorization?

    Upgrade undici to version 5.28.4, 6.11.1 or higher.

    <5.28.4>=6.0.0 <6.11.1
    • L
    Improper Access Control

    undici is an An HTTP/1.1 client, written from scratch for Node.js

    Affected versions of this package are vulnerable to Improper Access Control due to the integrity option passed to fetch(). An attacker can alter this option, allowing fetch() to accept requests as valid even if they have been tampered with.

    How to fix Improper Access Control?

    Upgrade undici to version 5.28.4, 6.11.1 or higher.

    <5.28.4>=6.0.0 <6.11.1
    • L
    Permissive Cross-domain Policy with Untrusted Domains

    undici is an An HTTP/1.1 client, written from scratch for Node.js

    Affected versions of this package are vulnerable to Permissive Cross-domain Policy with Untrusted Domains due to not clearing Proxy-Authentication headers on cross-origin redirects. An attacker can intercept the improperly cleared headers.

    How to fix Permissive Cross-domain Policy with Untrusted Domains?

    Upgrade undici to version 5.28.3, 6.6.1 or higher.

    <5.28.3>=6.0.0 <6.6.1
    • L
    Information Exposure

    undici is an An HTTP/1.1 client, written from scratch for Node.js

    Affected versions of this package are vulnerable to Information Exposure during the Cookie headers handling process. An attacker can potentially leak sensitive information to a third-party site or a malicious actor who can control the redirection target (i.e., an open redirector) by exploiting the disconnect between the spec's assumptions and the implementation of fetch.

    Note:

    This is only exploitable if the attacker can control the redirection target.

    How to fix Information Exposure?

    Upgrade undici to version 5.26.2 or higher.

    <5.26.2
    • H
    Regular Expression Denial of Service (ReDoS)

    undici is an An HTTP/1.1 client, written from scratch for Node.js

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the Headers.set() and Headers.append() methods, when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the headerValueNormalize() utility function.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade undici to version 5.19.1 or higher.

    <5.19.1
    • M
    CRLF Injection

    undici is an An HTTP/1.1 client, written from scratch for Node.js

    Affected versions of this package are vulnerable to CRLF Injection due to missing protection for the host HTTP header.

    How to fix CRLF Injection?

    Upgrade undici to version 5.19.1 or higher.

    >=2.0.0 <5.19.1