First published: Wed Nov 28 2018(Updated: )
Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
Credit: cve-request@iojs.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <8.14.0 | 8.14.0 |
redhat/nodejs | <6.15.0 | 6.15.0 |
Nodejs Node.js | >=6.0.0<=6.8.1 | |
Nodejs Node.js | >=6.9.0<6.15.0 | |
Nodejs Node.js | >=8.0.0<=8.8.1 | |
Nodejs Node.js | >=8.9.0<8.14.0 | |
Suse Suse Enterprise Storage | =4 | |
SUSE SUSE Linux Enterprise Server | =12 | |
SUSE SUSE Linux Enterprise Server | =15 | |
Suse Suse Openstack Cloud | =7 | |
Suse Suse Openstack Cloud | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12116 is a vulnerability in Node.js that allows for HTTP request splitting.
CVE-2018-12116 affects all versions prior to Node.js 6.15.0 and 8.14.0.
CVE-2018-12116 has a severity value of 7.5 (high).
To fix CVE-2018-12116, you need to update Node.js to version 6.15.0 or 8.14.0.
You can find more information about CVE-2018-12116 on the following references: - Red Hat advisory: https://access.redhat.com/errata/RHSA-2019:1821 - Node.js blog: https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ - Gentoo Security: https://security.gentoo.org/glsa/202003-48