First published: Fri Apr 13 2018(Updated: )
A flaw was found in http-proxy-agent versions before 2.1.0. The http-proxy-agent passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON). References: <a href="https://hackerone.com/reports/321631">https://hackerone.com/reports/321631</a> Patch: <a href="https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb">https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs-http-proxy-agent | <2.1.0 | 2.1.0 |
Http-proxy-agent Project Http-proxy-agent | <2.1.0 | |
Fedoraproject Fedora | =27 | |
Redhat Software Collections | ||
Redhat Enterprise Linux | =7.0 | |
<=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10196 is a vulnerability in the Node.js http-proxy-agent module that can result in a denial of service and data exposure.
CVE-2019-10196 has a critical severity rating of 9.8 out of 10.
CVE-2019-10196 affects the Node.js http-proxy-agent module version up to 2.1.0, Fedora 27, Redhat Software Collections, and Redhat Enterprise Linux 7.0.
CVE-2019-10196 can be exploited by passing a specially crafted auth option to the Buffer constructor, leading to a denial of service and potential data exposure.
To fix CVE-2019-10196, upgrade to http-proxy-agent version 2.1.0 or later.