Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
References
Link | Resource |
---|---|
https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034 | Patch |
https://github.com/nodejs/undici/releases/tag/v5.19.1 | Release Notes |
https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff | Vendor Advisory |
https://hackerone.com/reports/1820955 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-02-16T17:30:23.968Z
Updated: 2023-02-16T17:30:23.968Z
Reserved: 2023-01-19T21:12:31.361Z
Link: CVE-2023-23936
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-02-16T18:15:10.877
Modified: 2023-02-24T19:14:28.203
Link: CVE-2023-23936
JSON object: View
Redhat Information
No data.