Описание
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
devel | not-affected | 10.19.0~dfsg-3ubuntu1 |
eoan | ignored | end of life |
esm-apps/bionic | released | 8.10.0~dfsg-2ubuntu0.4+esm2 |
esm-apps/focal | not-affected | 10.19.0~dfsg-3ubuntu1 |
esm-apps/jammy | not-affected | 10.19.0~dfsg-3ubuntu1 |
esm-apps/xenial | released | 4.2.6~dfsg-1ubuntu4.2+esm2 |
esm-infra-legacy/trusty | ignored | regressions likely |
focal | not-affected | 10.19.0~dfsg-3ubuntu1 |
groovy | not-affected | 10.19.0~dfsg-3ubuntu1 |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
Including trailing white space in HTTP header values in Nodejs 10, 12, ...
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
Уязвимость программной платформы Node.js, связанная с недостаточной проверкой вводимых данных при обработке заголовков HTTP, позволяющая нарушителю получить полный контроль над приложением
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3