A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1567245 Issue Tracking Patch Third Party Advisory
https://www.npmjs.com/advisories/607 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2021-03-19T19:22:17

Updated: 2021-03-19T19:22:17

Reserved: 2019-03-27T00:00:00


Link: CVE-2019-10196

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-03-19T20:15:13.097

Modified: 2021-03-25T19:21:06.447


Link: CVE-2019-10196

JSON object: View

cve-icon Redhat Information

No data.

CWE