Nodejs

Undici

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 15.05.2025 17:16:02
  • Zuletzt bearbeitet 16.05.2025 14:43:26

Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the...

  • EPSS 0.08%
  • Veröffentlicht 21.01.2025 18:15:14
  • Zuletzt bearbeitet 21.01.2025 18:15:14

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predi...

  • EPSS 0.26%
  • Veröffentlicht 08.07.2024 21:15:12
  • Zuletzt bearbeitet 21.11.2024 09:25:31

Undici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the Node.js process. This has been patched in v6.19.2.

  • EPSS 0.17%
  • Veröffentlicht 04.04.2024 16:15:08
  • Zuletzt bearbeitet 13.02.2025 18:17:58

Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for `fetch()`, but did not clear them for `undici.request()`. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

Exploit
  • EPSS 0.18%
  • Veröffentlicht 04.04.2024 15:15:39
  • Zuletzt bearbeitet 18.12.2024 19:21:11

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in versio...

  • EPSS 0.12%
  • Veröffentlicht 16.02.2024 22:15:08
  • Zuletzt bearbeitet 17.12.2024 17:50:45

Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users ...

  • EPSS 0.36%
  • Veröffentlicht 16.02.2024 22:15:07
  • Zuletzt bearbeitet 17.12.2024 17:40:47

Undici is an HTTP/1.1 client, written from scratch for Node.js. In affected versions calling `fetch(url)` and not consuming the incoming body ((or consuming it very slowing) will lead to a memory leak. This issue has been addressed in version 6.6.1. ...

  • EPSS 0.08%
  • Veröffentlicht 12.10.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:26:26

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request head...

  • EPSS 0.25%
  • Veröffentlicht 16.02.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 07:48:26

Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is ...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 16.02.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:47:08

Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, s...