Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Node.js third-party modules: Default behavior of Fastifys versioned routes can be used for cache poisoning when Fastify is used in combination with a http cache / CDN

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Node.js third-party modules: Default behavior of Fastifys versioned routes can be used for cache poisoning when Fastify is used in combination with a http cache / CDN


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
I would like to report possible cache poisoning in Fastify It allows an attacker to perform an cache poisoning when Fastify is used in combination with a http cache / CDN. Module module name: Fastify version: 3.x npm page: https://www.npmjs.com/package/fastify Module Description Fast and low overhead web framework, for Node.js Module Stats 159,983 weekly downloads Vulnerability Vulnerability Description I might be missing the obvious or I've not read the documentation closely enough, but to me it seem like its not possible to turn off versioned routes in Fastify. The reason why I am reporting this issue as a security issue are because my reason to want to turn off versioned routes in Fastify is rooted in a security issue when using Fastify in relation with a http cache / CDN and I do not want to expose this in the common issue tracker because it can be used against running services. My current issue is that we have a Fastify server not using versioned routes where the server live behind a http cache / CDN. By default Fastify will return a 404 if a Accept-Version http header is passed on to an exiting route not under versioning. When there is a http cache / CDN infront of Fastify this will make it possible for an attacker to perform an cache poisoning attack (https://owasp.org/www-community/attacks/Cache_Poisoning). Steps To Reproduce: Given the following Fastify server: ```js const app = require('fastify')(); app.get('/', async () => { return { hello: 'world' }; });... ...



๐Ÿ“Œ New Cache Poisoning Attack Lets Attackers Target CDN Protected Sites


๐Ÿ“ˆ 42.53 Punkte

๐Ÿ“Œ New Cache Poisoning Attack Lets Attackers Target CDN Protected Sites


๐Ÿ“ˆ 42.53 Punkte

๐Ÿ“Œ CPDoS โ€“ New Web-Based Web Cache Poisoning Attack On Websites That Using CDN


๐Ÿ“ˆ 42.53 Punkte

๐Ÿ“Œ Next.js 14 Intercepting Routes with Dynamic Routes


๐Ÿ“ˆ 38.38 Punkte

๐Ÿ“Œ CVE-2020-10112 | Citrix Gateway 11.1/12.0/12.1 Cache Cache Poisoning request smuggling (ID 156660)


๐Ÿ“ˆ 33.21 Punkte

๐Ÿ“Œ Fastify up to 0.37.x on Node.js Content-Type denial of service


๐Ÿ“ˆ 31.81 Punkte

๐Ÿ“Œ Node.js-Framework: Fastify 3.0 erweitert die Unterstรผtzung fรผr TypeScript


๐Ÿ“ˆ 31.81 Punkte

๐Ÿ“Œ Testing Fastify with Node:Test


๐Ÿ“ˆ 31.81 Punkte

๐Ÿ“Œ Fastify bis 0.37.x auf Node.js Content-Type Denial of Service


๐Ÿ“ˆ 31.81 Punkte

๐Ÿ“Œ How to create a lan server using Node.js and Fastify.js


๐Ÿ“ˆ 31.81 Punkte

๐Ÿ“Œ CVE-2024-22207 | fastify-swagger-ui up to 2.0.x insecure default initialization of resource


๐Ÿ“ˆ 31.57 Punkte

๐Ÿ“Œ [release] brig 0.4.0: distributed, versioned & secure file synchronization


๐Ÿ“ˆ 30.75 Punkte

๐Ÿ“Œ SilverStripe up to 2.0.3 Versioned Files Module information disclosure


๐Ÿ“ˆ 30.75 Punkte

๐Ÿ“Œ CVE-2022-38145 | SilverStripe versioned-admin prior 1.11.1 Compare Mode cross site scripting


๐Ÿ“ˆ 30.75 Punkte

๐Ÿ“Œ How to Create System Versioned Tables in MariaDB


๐Ÿ“ˆ 30.75 Punkte

๐Ÿ“Œ Undertow HTTP HTTP Response Cache Poisoning privilege escalation


๐Ÿ“ˆ 30.04 Punkte

๐Ÿ“Œ Undertow HTTP HTTP Response Cache Poisoning erweiterte Rechte


๐Ÿ“ˆ 30.04 Punkte

๐Ÿ“Œ On the third day of Enhancing: API routes and the Store


๐Ÿ“ˆ 28.46 Punkte

๐Ÿ“Œ How to Create User Routes in Node.js: A Step-by-Step Guide


๐Ÿ“ˆ 27.52 Punkte

๐Ÿ“Œ Eclipse Jetty up to 9.2.x/9.3.x/9.4.x HTTP 0.9 Request Cache Poisoning privilege escalation


๐Ÿ“ˆ 27.39 Punkte

๐Ÿ“Œ SilverStripe CMS up to 4.4.4 HTTP Header Cache Poisoning request smuggling


๐Ÿ“ˆ 27.39 Punkte

๐Ÿ“Œ Eclipse Jetty bis 9.2.x/9.3.x/9.4.x HTTP 0.9 Request Cache Poisoning erweiterte Rechte


๐Ÿ“ˆ 27.39 Punkte

๐Ÿ“Œ Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning


๐Ÿ“ˆ 27.39 Punkte

๐Ÿ“Œ In-Home Dog Training & Behavior Modification: Transforming Canine Behavior in the Comfort of Home


๐Ÿ“ˆ 27.08 Punkte

๐Ÿ“Œ Curl Shell Script To Purge Cache From Stackpath CDN


๐Ÿ“ˆ 26.27 Punkte

๐Ÿ“Œ Cache-Poisoned DoS Attack Against CDN Protected Sites


๐Ÿ“ˆ 26.27 Punkte

๐Ÿ“Œ CoralRaider attacks use CDN cache to push info-stealer malware


๐Ÿ“ˆ 26.27 Punkte

๐Ÿ“Œ CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers


๐Ÿ“ˆ 26.27 Punkte

๐Ÿ“Œ fastify-http-proxy up to 4.3.0 on npm escape output [CVE-2021-21322]


๐Ÿ“ˆ 26.14 Punkte

๐Ÿ“Œ fastify-reply-from up to 4.0.1 on npm HTTP Request escape output


๐Ÿ“ˆ 26.14 Punkte

๐Ÿ“Œ Node.js: Take over subdomain undici.nodejs.org.cdn.cloudflare.net


๐Ÿ“ˆ 26.12 Punkte

๐Ÿ“Œ WP Super Cache Plugin up to 1.7.1 on WordPress Cache Settings wp-cache-config.php cache_path code injection


๐Ÿ“ˆ 25.42 Punkte

๐Ÿ“Œ Practical C++20 Modules and the future of tooling around C++ Modules with Cameron DaCamara


๐Ÿ“ˆ 25.15 Punkte











matomo