Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cxrh-j4jr-qwg3

Опубликовано: 15 мая 2025
Источник: github
Github: Прошло ревью
CVSS3: 3.1

Описание

undici Denial of Service attack via bad certificate data

Impact

Applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak.

Patches

This has been patched in https://github.com/nodejs/undici/pull/4088.

Workarounds

If a webhook fails, avoid keep calling it repeatedly.

References

Reported as: https://github.com/nodejs/undici/issues/3895

Пакеты

Наименование

undici

npm
Затронутые версииВерсия исправления

< 5.29.0

5.29.0

Наименование

undici

npm
Затронутые версииВерсия исправления

>= 6.0.0, < 6.21.2

6.21.2

Наименование

undici

npm
Затронутые версииВерсия исправления

>= 7.0.0, < 7.5.0

7.5.0

EPSS

Процентиль: 12%
0.00043
Низкий

3.1 Low

CVSS3

Дефекты

CWE-401

Связанные уязвимости

CVSS3: 3.1
ubuntu
3 месяца назад

Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak. This has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a workaound, avoid calling a webhook repeatedly if the webhook fails.

CVSS3: 3.1
redhat
3 месяца назад

Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak. This has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a workaound, avoid calling a webhook repeatedly if the webhook fails.

CVSS3: 3.1
nvd
3 месяца назад

Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak. This has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a workaound, avoid calling a webhook repeatedly if the webhook fails.

CVSS3: 3.1
msrc
около 1 месяца назад

Описание отсутствует

CVSS3: 3.1
debian
3 месяца назад

Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6. ...

EPSS

Процентиль: 12%
0.00043
Низкий

3.1 Low

CVSS3

Дефекты

CWE-401