CVE-2025-47279
- EPSS 0.06%
- Veröffentlicht 15.05.2025 17:16:02
- Zuletzt bearbeitet 16.05.2025 14:43:26
Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the...
CVE-2025-22150
- EPSS 0.05%
- Veröffentlicht 21.01.2025 18:15:14
- Zuletzt bearbeitet 21.01.2025 18:15:14
Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predi...
- EPSS 0.26%
- Veröffentlicht 08.07.2024 21:15:12
- Zuletzt bearbeitet 21.11.2024 09:25:31
Undici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the Node.js process. This has been patched in v6.19.2.
CVE-2024-30260
- EPSS 0.17%
- Veröffentlicht 04.04.2024 16:15:08
- Zuletzt bearbeitet 13.02.2025 18:17:58
Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for `fetch()`, but did not clear them for `undici.request()`. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.
CVE-2024-30261
- EPSS 0.18%
- Veröffentlicht 04.04.2024 15:15:39
- Zuletzt bearbeitet 18.12.2024 19:21:11
Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in versio...
CVE-2024-24758
- EPSS 0.12%
- Veröffentlicht 16.02.2024 22:15:08
- Zuletzt bearbeitet 17.12.2024 17:50:45
Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users ...
CVE-2024-24750
- EPSS 0.36%
- Veröffentlicht 16.02.2024 22:15:07
- Zuletzt bearbeitet 17.12.2024 17:40:47
Undici is an HTTP/1.1 client, written from scratch for Node.js. In affected versions calling `fetch(url)` and not consuming the incoming body ((or consuming it very slowing) will lead to a memory leak. This issue has been addressed in version 6.6.1. ...
CVE-2023-45143
- EPSS 0.08%
- Veröffentlicht 12.10.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:26:26
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request head...
CVE-2023-24807
- EPSS 0.25%
- Veröffentlicht 16.02.2023 18:15:12
- Zuletzt bearbeitet 21.11.2024 07:48:26
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is ...
CVE-2023-23936
- EPSS 0.49%
- Veröffentlicht 16.02.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 07:47:08
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, s...