Lucene search

K
githubGitHub Advisory DatabaseGHSA-M4V8-WQVR-P9F7
HistoryApr 04, 2024 - 2:20 p.m.

Undici's Proxy-Authorization header not cleared on cross-origin redirect for dispatch, request, stream, pipeline

2024-04-0414:20:39
CWE-200
CWE-285
GitHub Advisory Database
github.com
22
undici
proxy-authorization
cross-origin
redirect
dispatch
request
stream
pipeline
fix
workaround
maxredirections
security advisory
vulnerability
nodejs
hackerone
github

3.9 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

Impact

Undici cleared Authorization and Proxy-Authorization headers for fetch(), but did not clear them for undici.request().

Patches

This has been patched in https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75.
Fixes has been released in v5.28.4 and v6.11.1.

Workarounds

use fetch() or disable maxRedirections.

References

Linzi Shang reported this.

Affected configurations

Vulners
Node
nodejsundiciRange<6.11.1
OR
nodejsundiciRange<5.28.4
CPENameOperatorVersion
undicilt6.11.1
undicilt5.28.4

3.9 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%