Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-58754

Опубликовано: 12 сент. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to version 1.11.0 runs on Node.js and is given a URL with the data: scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (Buffer/Blob) and returns a synthetic 200 response. This path ignores maxContentLength / maxBodyLength (which only protect HTTP responses), so an attacker can supply a very large data: URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested responseType: 'stream'. Version 1.11.0 contains a patch for the issue.

Отчет

Availability impact is limited to the application which bundles axios and not the host Red Hat system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 4io.cryostat-cryostatNot affected
Gatekeeper 3gatekeeper/gatekeeper-rhel9Affected
Migration Toolkit for Applications 7mta/mta-ui-rhel9Affected
Migration Toolkit for Containersrhmtc/openshift-migration-ui-rhel8Affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel9Affected
Multicluster Global Hubmulticluster-globalhub/multicluster-globalhub-grafana-rhel9Affected
Network Observability Operatornetwork-observability/network-observability-console-plugin-compat-rhel9Affected
Network Observability Operatornetwork-observability/network-observability-console-plugin-rhel9Affected
OpenShift Pipelinesopenshift-pipelines/pipelines-hub-api-rhel8Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2394735axios: Axios DoS via lack of data size check

EPSS

Процентиль: 5%
0.00025
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 месяцев назад

Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.

CVSS3: 7.5
nvd
около 2 месяцев назад

Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.

msrc
около 2 месяцев назад

Axios is vulnerable to DoS attack through lack of data size check

CVSS3: 7.5
debian
около 2 месяцев назад

Axios is a promise based HTTP client for the browser and Node.js. When ...

CVSS3: 7.5
github
около 2 месяцев назад

Axios is vulnerable to DoS attack through lack of data size check

EPSS

Процентиль: 5%
0.00025
Низкий

5.3 Medium

CVSS3