undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet will perform two requests in a single `request` API call: 1) `http://localhost:3000/` 2) `http://localhost:3000/foo2` This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.
Metrics
Affected Vendors & Products
References
History
Sun, 08 Sep 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat acm |
|
CPEs | cpe:/a:redhat:acm:2.4::el8 | |
Vendors & Products |
Redhat
Redhat acm |
Mon, 19 Aug 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Redhat
Redhat acm |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-08-13T00:00:00
Updated: 2024-08-03T09:51:59.082Z
Reserved: 2022-07-15T00:00:00
Link: CVE-2022-35948
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-08-15T11:21:38.353
Modified: 2024-11-21T07:12:01.817
Link: CVE-2022-35948
Redhat