A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0521 | A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter. |
Github GHSA |
GHSA-86wf-436m-h424 | Resource Exhaustion Denial of Service in http-proxy-agent |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T22:17:18.934Z
Reserved: 2019-03-27T00:00:00
Link: CVE-2019-10196
No data.
Status : Modified
Published: 2021-03-19T20:15:13.097
Modified: 2024-11-21T04:18:37.977
Link: CVE-2019-10196
OpenCVE Enrichment
No data.
EUVD
Github GHSA