First published: Thu Apr 26 2018(Updated: )
https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Https-proxy-agent Project Https-proxy-agent | <2.2.0 | |
<=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3739 is a vulnerability in the Node.js https-proxy-agent module that allows a remote attacker to exploit the auth parameter and cause a denial of service by consuming all available memory.
CVE-2018-3739 affects versions up to and excluding 2.2.0 of the Https-proxy-agent module, allowing an attacker to leak memory and cause a denial of service.
CVE-2018-3739 has a severity rating of 9.1 (Critical).
To fix CVE-2018-3739, you should update your Https-proxy-agent module to version 2.2.1 or higher.
Yes, you can find references for CVE-2018-3739 at the following links: [HackerOne report](https://hackerone.com/reports/319532), [IBM X-Force report](https://exchange.xforce.ibmcloud.com/vulnerabilities/143928), [IBM Support page](https://www.ibm.com/support/pages/node/7057377).