← Volver a CVEs
CVE-2023-24807
HIGH7.5
Descripcion
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/16/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
nodejs:undici
Debilidades (CWE)
CWE-20CWE-1333
Referencias
https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf(security-advisories@github.com)
https://github.com/nodejs/undici/releases/tag/v5.19.1(security-advisories@github.com)
https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w(security-advisories@github.com)
https://hackerone.com/bugs?report_id=1784449(security-advisories@github.com)
https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/nodejs/undici/releases/tag/v5.19.1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w(af854a3a-2127-422b-91ae-364da2661108)
https://hackerone.com/bugs?report_id=1784449(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20230324-0010/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.