← Back to CVEs
CVE-2023-24807
HIGH7.5
Description
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/16/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
nodejs:undici
Weaknesses (CWE)
CWE-20CWE-1333
References
https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf(security-advisories@github.com)
https://github.com/nodejs/undici/releases/tag/v5.19.1(security-advisories@github.com)
https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w(security-advisories@github.com)
https://hackerone.com/bugs?report_id=1784449(security-advisories@github.com)
https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/nodejs/undici/releases/tag/v5.19.1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w(af854a3a-2127-422b-91ae-364da2661108)
https://hackerone.com/bugs?report_id=1784449(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20230324-0010/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.