undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-6216 undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue.
Github GHSA Github GHSA GHSA-3cvr-822r-rqcc undici before v5.8.0 vulnerable to CRLF injection in request headers
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 22 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 08 Sep 2024 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat acm
CPEs cpe:/a:redhat:acm:2.4::el8
Vendors & Products Redhat
Redhat acm

Mon, 19 Aug 2024 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.4::el8
Vendors & Products Redhat
Redhat acm

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-22T17:48:45.328Z

Reserved: 2022-05-18T00:00:00.000Z

Link: CVE-2022-31150

cve-icon Vulnrichment

Updated: 2024-08-03T07:11:39.394Z

cve-icon NVD

Status : Modified

Published: 2022-07-19T21:15:15.160

Modified: 2024-11-21T07:04:00.207

Link: CVE-2022-31150

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-07-19T00:00:00Z

Links: CVE-2022-31150 - Bugzilla

cve-icon OpenCVE Enrichment

No data.