Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-30260
HistoryApr 04, 2024 - 3:15 p.m.

CVE-2024-30260 Undici's Proxy-Authorization header not cleared on cross-origin redirect for dispatch, request, stream, pipeline

2024-04-0415:15:44
CWE-285
GitHub_M
www.cve.org
2
undici
http client
node.js
vulnerability
patched
cross-origin redirect

3.9 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

4.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for fetch(), but did not clear them for undici.request(). This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

CNA Affected

[
  {
    "vendor": "nodejs",
    "product": "undici",
    "versions": [
      {
        "version": "< 5.28.4",
        "status": "affected"
      },
      {
        "version": ">= 6.0.0, < 6.11.1",
        "status": "affected"
      }
    ]
  }
]

3.9 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

4.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%