Nodejs

Undici

22 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 12.03.2026 20:27:05
  • Zuletzt bearbeitet 20.03.2026 15:39:12

ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically adver...

  • EPSS 0.13%
  • Veröffentlicht 12.03.2026 20:21:57
  • Zuletzt bearbeitet 20.03.2026 15:41:40

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches ...

  • EPSS 0.01%
  • Veröffentlicht 12.03.2026 20:17:18
  • Zuletzt bearbeitet 20.03.2026 15:49:31

ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to: * Inject arbitrary HTTP headers * Terminate the HTTP request prematurely and smuggle raw data to...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2026 20:13:19
  • Zuletzt bearbeitet 18.03.2026 13:37:08

This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS). In vulnerable Undici versions, when interceptors.deduplicate() is enabled, response data for deduplicated requests could be accumulated in...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2026 20:08:05
  • Zuletzt bearbeitet 20.03.2026 15:56:47

The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incomin...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2026 19:56:55
  • Zuletzt bearbeitet 19.03.2026 17:29:34

Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the...

  • EPSS 0.02%
  • Veröffentlicht 14.01.2026 19:07:13
  • Zuletzt bearbeitet 22.01.2026 21:15:50

Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage ...

  • EPSS 0.05%
  • Veröffentlicht 15.05.2025 17:16:02
  • Zuletzt bearbeitet 06.02.2026 20:16:08

Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the...

  • EPSS 0.61%
  • Veröffentlicht 21.01.2025 18:15:14
  • Zuletzt bearbeitet 21.01.2025 18:15:14

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predi...

  • EPSS 0.22%
  • Veröffentlicht 08.07.2024 21:15:12
  • Zuletzt bearbeitet 21.11.2024 09:25:31

Undici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the Node.js process. This has been patched in v6.19.2.