Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5j8w-g8hc-6222

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.

The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.

EPSS

Процентиль: 70%
0.0062
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 13 лет назад

The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.

nvd
больше 13 лет назад

The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.

debian
больше 13 лет назад

The Update method in src/node_http_parser.cc in Node.js before 0.6.17 ...

EPSS

Процентиль: 70%
0.0062
Низкий

Дефекты

CWE-20