Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-15168

Опубликовано: 10 сент. 2020
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after fetch() has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2node-fetchFix deferred
Red Hat Advanced Cluster Management for Kubernetes 2acmesolver-containerFixedRHEA-2021:072904.03.2021
Red Hat Advanced Cluster Management for Kubernetes 2acm-must-gather-containerFixedRHEA-2021:072904.03.2021
Red Hat Advanced Cluster Management for Kubernetes 2acm-operator-bundle-containerFixedRHEA-2021:072904.03.2021
Red Hat Advanced Cluster Management for Kubernetes 2application-ui-containerFixedRHEA-2021:072904.03.2021
Red Hat Advanced Cluster Management for Kubernetes 2cainjector-containerFixedRHEA-2021:072904.03.2021
Red Hat Advanced Cluster Management for Kubernetes 2cert-manager-controller-containerFixedRHEA-2021:072904.03.2021
Red Hat Advanced Cluster Management for Kubernetes 2cert-manager-webhook-containerFixedRHEA-2021:072904.03.2021
Red Hat Advanced Cluster Management for Kubernetes 2cert-policy-controller-containerFixedRHEA-2021:072904.03.2021
Red Hat Advanced Cluster Management for Kubernetes 2clusterlifecycle-state-metrics-containerFixedRHEA-2021:072904.03.2021

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1882329node-fetch: size of data after fetch() JS thread leads to DoS

EPSS

Процентиль: 30%
0.00114
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 2.6
ubuntu
больше 5 лет назад

node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after fetch() has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.

CVSS3: 2.6
nvd
больше 5 лет назад

node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after fetch() has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.

CVSS3: 2.6
debian
больше 5 лет назад

node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the si ...

CVSS3: 2.6
github
больше 5 лет назад

The `size` option isn't honored after following a redirect in node-fetch

CVSS3: 5.3
fstec
больше 4 лет назад

Уязвимость библиотеки node-fetch прикладного программного обеспечения Аврора Центр, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 30%
0.00114
Низкий

5.3 Medium

CVSS3