7.16.0
7 years ago
2 months ago
Known vulnerabilities in the undici package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
undici is an An HTTP/1.1 client, written from scratch for Node.js Affected versions of this package are vulnerable to Missing Release of Memory after Effective Lifetime due to improper handling of invalid certificate data. An attacker can cause a memory leak by setting up a server with a bad certificate and inducing the application to repeatedly call a webhook-like system. How to fix Missing Release of Memory after Effective Lifetime? Upgrade | <5.29.0>=6.0.0 <6.21.2>=7.0.0 <7.5.0 |
undici is an An HTTP/1.1 client, written from scratch for Node.js Affected versions of this package are vulnerable to Insecure Randomness due to the use of Note: This is only exploitable if multipart requests are sent to an attacker-controlled server. How to fix Insecure Randomness? Upgrade | >=4.5.0 <5.28.5>=6.0.0 <6.21.1>=7.0.0 <7.2.3 |
undici is an An HTTP/1.1 client, written from scratch for Node.js Affected versions of this package are vulnerable to Improper Authorization due to improper handling of How to fix Improper Authorization? Upgrade | <5.28.4>=6.0.0 <6.11.1 |
undici is an An HTTP/1.1 client, written from scratch for Node.js Affected versions of this package are vulnerable to Improper Access Control due to the How to fix Improper Access Control? Upgrade | <5.28.4>=6.0.0 <6.11.1 |
undici is an An HTTP/1.1 client, written from scratch for Node.js Affected versions of this package are vulnerable to Permissive Cross-domain Policy with Untrusted Domains due to not clearing How to fix Permissive Cross-domain Policy with Untrusted Domains? Upgrade | <5.28.3>=6.0.0 <6.6.1 |
undici is an An HTTP/1.1 client, written from scratch for Node.js Affected versions of this package are vulnerable to Information Exposure during the Note: This is only exploitable if the attacker can control the redirection target. How to fix Information Exposure? Upgrade | <5.26.2 |
undici is an An HTTP/1.1 client, written from scratch for Node.js Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | <5.19.1 |
undici is an An HTTP/1.1 client, written from scratch for Node.js Affected versions of this package are vulnerable to CRLF Injection due to missing protection for the How to fix CRLF Injection? Upgrade | >=2.0.0 <5.19.1 |