First published: Fri Feb 07 2020(Updated: )
Affected Node.js versions can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. Downloads & release details * Node.js v10.19.0 (LTS) - <a href="https://nodejs.org/en/blog/release/v10.19.0/">https://nodejs.org/en/blog/release/v10.19.0/</a> * Node.js v12.15.0 (LTS) - <a href="https://nodejs.org/en/blog/release/v12.15.0/">https://nodejs.org/en/blog/release/v12.15.0/</a> * Node.js v13.8.0 (LTS) - <a href="https://nodejs.org/en/blog/release/v13.8.0/">https://nodejs.org/en/blog/release/v13.8.0/</a>
Credit: support@hackerone.com support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <10.19.0 | 10.19.0 |
redhat/nodejs | <12.15.0 | 12.15.0 |
redhat/nodejs | <13.8.0 | 13.8.0 |
redhat/http-parser | <2.9.3 | 2.9.3 |
debian/http-parser | 2.9.4-4+deb11u1 2.9.4-5 2.9.4-6 | |
debian/nodejs | 12.22.12~dfsg-1~deb11u4 12.22.12~dfsg-1~deb11u5 18.19.0+dfsg-6~deb12u2 18.19.0+dfsg-6~deb12u1 20.17.0+dfsg-2 | |
Node.js | >=10.0.0<10.19.0 | |
Node.js | >=12.0.0<12.15.0 | |
Node.js | >=13.0.0<13.8.0 | |
Debian Linux | =10.0 | |
Red Hat Fedora | =30 | |
SUSE Linux | =15.1 | |
Red Hat Software Collections | =1.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server EUS | =8.6 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Oracle GraalVM Enterprise Edition | =19.3.1 | |
Oracle GraalVM Enterprise Edition | =20.0.0 | |
Node.js | >=13.0.0<13.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Node.js HTTP request smuggling vulnerability is CVE-2019-15605.
CVE-2019-15605 has a severity level of high.
Versions 10, 12, and 13 of Node.js are affected by CVE-2019-15605.
CVE-2019-15605 can allow for malicious payload delivery when the transfer-encoding is malformed, potentially leading to unauthorized access or other security breaches.
To fix CVE-2019-15605 in Node.js, you should update to the recommended versions provided by the relevant software sources.