Количество 19
Количество 19
BDU:2023-07356
Уязвимость клиента HTTP/1.1 undici программной платформы Node.js, позволяющая нарушителю раскрыть защищаемую информацию
ROS-20240916-03
Множественные уязвимости nodejs
CVE-2023-45143
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.
CVE-2023-45143
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.
CVE-2023-45143
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.
CVE-2023-45143
Undici's cookie header not cleared on cross-origin redirect in fetch
CVE-2023-45143
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ...
GHSA-wqq4-5wpv-mx2g
Undici's cookie header not cleared on cross-origin redirect in fetch
SUSE-SU-2023:4207-1
Security update for nodejs18
SUSE-SU-2023:4155-1
Security update for nodejs18
SUSE-SU-2023:4150-1
Security update for nodejs18
SUSE-SU-2023:4133-1
Security update for nodejs18
SUSE-SU-2023:4132-1
Security update for nodejs18
RLSA-2023:5869
Important: nodejs:18 security update
RLSA-2023:5849
Important: nodejs:18 security update
ELSA-2023-5869
ELSA-2023-5869: nodejs:18 security update (IMPORTANT)
ELSA-2023-5849
ELSA-2023-5849: 18 security update (IMPORTANT)
RLSA-2023:7205
Important: nodejs:20 security update
ELSA-2023-7205
ELSA-2023-7205: nodejs:20 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2023-07356 Уязвимость клиента HTTP/1.1 undici программной платформы Node.js, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 3.5 | 0% Низкий | больше 2 лет назад | |
ROS-20240916-03 Множественные уязвимости nodejs | CVSS3: 7.5 | больше 1 года назад | ||
CVE-2023-45143 Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds. | CVSS3: 3.9 | 0% Низкий | больше 2 лет назад | |
CVE-2023-45143 Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds. | CVSS3: 3.9 | 0% Низкий | больше 2 лет назад | |
CVE-2023-45143 Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds. | CVSS3: 3.9 | 0% Низкий | больше 2 лет назад | |
CVE-2023-45143 Undici's cookie header not cleared on cross-origin redirect in fetch | CVSS3: 3.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-45143 Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ... | CVSS3: 3.9 | 0% Низкий | больше 2 лет назад | |
GHSA-wqq4-5wpv-mx2g Undici's cookie header not cleared on cross-origin redirect in fetch | CVSS3: 3.9 | 0% Низкий | больше 2 лет назад | |
SUSE-SU-2023:4207-1 Security update for nodejs18 | больше 2 лет назад | |||
SUSE-SU-2023:4155-1 Security update for nodejs18 | больше 2 лет назад | |||
SUSE-SU-2023:4150-1 Security update for nodejs18 | больше 2 лет назад | |||
SUSE-SU-2023:4133-1 Security update for nodejs18 | больше 2 лет назад | |||
SUSE-SU-2023:4132-1 Security update for nodejs18 | больше 2 лет назад | |||
RLSA-2023:5869 Important: nodejs:18 security update | 2 месяца назад | |||
RLSA-2023:5849 Important: nodejs:18 security update | 2 месяца назад | |||
ELSA-2023-5869 ELSA-2023-5869: nodejs:18 security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-5849 ELSA-2023-5849: 18 security update (IMPORTANT) | больше 2 лет назад | |||
RLSA-2023:7205 Important: nodejs:20 security update | около 2 лет назад | |||
ELSA-2023-7205 ELSA-2023-7205: nodejs:20 security update (IMPORTANT) | около 2 лет назад |
Уязвимостей на страницу