Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-30261

Опубликовано: 04 апр. 2024
Источник: redhat
CVSS3: 2.6
EPSS Низкий

Описание

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the integrity option passed to fetch(), allowing fetch() to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

A flaw was found in the nodejs-undici package. This issue may allow an attacker to alter the integrity option passed to fetch(), allowing fetch() to accept requests as valid even if they have been tampered with.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10nodejs-undiciNot affected
Red Hat JBoss Enterprise Application Platform 8org.keycloak-keycloak-parentFix deferred
Red Hat OpenShift Dev Spaces 3 Containersdevspaces/dashboard-rhel8FixedRHSA-2024:666712.09.2024
Red Hat Developer Hub (RHDH) 1.4registry.redhat.io/rhdh/rhdh-hub-rhel9FixedRHSA-2025:193127.02.2025

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=2273519nodejs-undici: fetch() with integrity option is too lax when algorithm is specified but hash value is in incorrect

EPSS

Процентиль: 24%
0.00081
Низкий

2.6 Low

CVSS3

Связанные уязвимости

CVSS3: 2.6
ubuntu
почти 2 года назад

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

CVSS3: 2.6
nvd
почти 2 года назад

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

CVSS3: 3.5
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 2.6
debian
почти 2 года назад

Undici is an HTTP/1.1 client, written from scratch for Node.js. An att ...

CVSS3: 2.6
github
почти 2 года назад

Undici's fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect

EPSS

Процентиль: 24%
0.00081
Низкий

2.6 Low

CVSS3