CVE-2023-24807

Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*

History

24 Feb 2023, 18:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-1333
CPE cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*
First Time Nodejs
Nodejs undici
References (MISC) https://hackerone.com/bugs?report_id=1784449 - (MISC) https://hackerone.com/bugs?report_id=1784449 - Permissions Required, Third Party Advisory
References (MISC) https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w - (MISC) https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w - Vendor Advisory
References (MISC) https://github.com/nodejs/undici/releases/tag/v5.19.1 - (MISC) https://github.com/nodejs/undici/releases/tag/v5.19.1 - Release Notes
References (MISC) https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf - (MISC) https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf - Patch

16 Feb 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-16 18:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-24807

Mitre link : CVE-2023-24807

CVE.ORG link : CVE-2023-24807


JSON object : View

Products Affected

nodejs

  • undici
CWE
CWE-1333 CWE-20

Improper Input Validation