Nodejs

Undici

22 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 04.04.2024 16:15:08
  • Zuletzt bearbeitet 04.11.2025 17:15:50

Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for `fetch()`, but did not clear them for `undici.request()`. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 04.04.2024 15:15:39
  • Zuletzt bearbeitet 04.11.2025 17:15:50

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in versio...

  • EPSS 0.28%
  • Veröffentlicht 16.02.2024 22:15:08
  • Zuletzt bearbeitet 17.12.2024 17:50:45

Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users ...

  • EPSS 0.32%
  • Veröffentlicht 16.02.2024 22:15:07
  • Zuletzt bearbeitet 17.12.2024 17:40:47

Undici is an HTTP/1.1 client, written from scratch for Node.js. In affected versions calling `fetch(url)` and not consuming the incoming body ((or consuming it very slowing) will lead to a memory leak. This issue has been addressed in version 6.6.1. ...

  • EPSS 0.11%
  • Veröffentlicht 12.10.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:26:26

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request head...

  • EPSS 0.31%
  • Veröffentlicht 16.02.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 07:48:26

Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is ...

Exploit
  • EPSS 0.73%
  • Veröffentlicht 16.02.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:47:08

Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, s...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 15.08.2022 11:21:38
  • Zuletzt bearbeitet 21.11.2024 07:12:01

undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` im...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 12.08.2022 23:15:07
  • Zuletzt bearbeitet 21.11.2024 07:12:01

undici is an HTTP/1.1 client, written from scratch for Node.js.`undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`. If a user specifies a URL suc...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 21.07.2022 04:15:12
  • Zuletzt bearbeitet 21.11.2024 07:04:00

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to acci...