Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-30261

Опубликовано: 04 апр. 2024
Источник: debian

Описание

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-undicifixed5.28.4+dfsg1+~cs23.12.11-1package
node-undicino-dsabookwormpackage

Примечания

  • https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672

  • https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055 (v5.28.4)

  • https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3 (v6.11.1)

  • https://hackerone.com/reports/2377760

Связанные уязвимости

CVSS3: 2.6
ubuntu
почти 2 года назад

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

CVSS3: 2.6
redhat
почти 2 года назад

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

CVSS3: 2.6
nvd
почти 2 года назад

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

CVSS3: 3.5
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 2.6
github
почти 2 года назад

Undici's fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect