Логотип exploitDog
bind:"CVE-2023-44487" OR bind:"CVE-2023-39333" OR bind:"CVE-2023-38552" OR bind:"CVE-2023-45143"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-44487" OR bind:"CVE-2023-39333" OR bind:"CVE-2023-38552" OR bind:"CVE-2023-45143"

Количество 117

Количество 117

nvd логотип

CVE-2023-45143

около 2 лет назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
EPSS: Низкий
msrc логотип

CVE-2023-45143

около 2 лет назад

Undici's cookie header not cleared on cross-origin redirect in fetch

CVSS3: 3.5
EPSS: Низкий
debian логотип

CVE-2023-45143

около 2 лет назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ...

CVSS3: 3.9
EPSS: Низкий
ubuntu логотип

CVE-2023-38552

около 2 лет назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-38552

около 2 лет назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-38552

около 2 лет назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-38552

около 2 лет назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest the application can intercept the operation and return a forged checksum to the node's policy implementation thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and 20.x. Please note that at the time this CVE was issued the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-38552

около 2 лет назад

When the Node.js policy feature checks the integrity of a resource aga ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3343-1

около 1 года назад

Security update for kubernetes1.24

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3341-1

около 1 года назад

Security update for kubernetes1.23

EPSS: Низкий
redos логотип

ROS-20240805-03

больше 1 года назад

Множественные уязвимости consul

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4469-1

около 2 лет назад

Security update for go1.21-openssl

EPSS: Низкий
redos логотип

ROS-20240423-06

больше 1 года назад

Множественные уязвимости consul

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-wqq4-5wpv-mx2g

около 2 лет назад

Undici's cookie header not cleared on cross-origin redirect in fetch

CVSS3: 3.9
EPSS: Низкий
fstec логотип

BDU:2023-07356

около 2 лет назад

Уязвимость клиента HTTP/1.1 undici программной платформы Node.js, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 3.5
EPSS: Низкий
github логотип

GHSA-x39v-frq9-5hh8

около 2 лет назад

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-07176

около 2 лет назад

Уязвимость программной платформы Node.js, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю отключить проверку целостности

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-45143

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
0%
Низкий
около 2 лет назад
msrc логотип
CVE-2023-45143

Undici's cookie header not cleared on cross-origin redirect in fetch

CVSS3: 3.5
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-45143

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ...

CVSS3: 3.9
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
msrc логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource against a trusted manifest the application can intercept the operation and return a forged checksum to the node's policy implementation thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and 20.x. Please note that at the time this CVE was issued the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-38552

When the Node.js policy feature checks the integrity of a resource aga ...

CVSS3: 7.5
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:3343-1

Security update for kubernetes1.24

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3341-1

Security update for kubernetes1.23

около 1 года назад
redos логотип
ROS-20240805-03

Множественные уязвимости consul

CVSS3: 7.5
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4469-1

Security update for go1.21-openssl

около 2 лет назад
redos логотип
ROS-20240423-06

Множественные уязвимости consul

CVSS3: 7.5
больше 1 года назад
github логотип
GHSA-wqq4-5wpv-mx2g

Undici's cookie header not cleared on cross-origin redirect in fetch

CVSS3: 3.9
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-07356

Уязвимость клиента HTTP/1.1 undici программной платформы Node.js, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 3.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-x39v-frq9-5hh8

When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x. Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-07176

Уязвимость программной платформы Node.js, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю отключить проверку целостности

CVSS3: 7.5
0%
Низкий
около 2 лет назад

Уязвимостей на страницу