First published: Fri Feb 07 2020(Updated: )
Affected Node.js versions can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. Downloads & release details * Node.js v10.19.0 (LTS) - <a href="https://nodejs.org/en/blog/release/v10.19.0/">https://nodejs.org/en/blog/release/v10.19.0/</a> * Node.js v12.15.0 (LTS) - <a href="https://nodejs.org/en/blog/release/v12.15.0/">https://nodejs.org/en/blog/release/v12.15.0/</a> * Node.js v13.8.0 (LTS) - <a href="https://nodejs.org/en/blog/release/v13.8.0/">https://nodejs.org/en/blog/release/v13.8.0/</a>
Credit: support@hackerone.com support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nodejs Node.js | >=10.0.0<10.19.0 | |
Nodejs Node.js | >=12.0.0<12.15.0 | |
Nodejs Node.js | >=13.0.0<13.8.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
openSUSE Leap | =15.1 | |
Redhat Software Collections | =1.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =7.7 | |
Redhat Enterprise Linux Eus | =8.1 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.7 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.6 | |
Redhat Enterprise Linux Server Tus | =7.7 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Oracle GraalVM | =19.3.1 | |
Oracle GraalVM | =20.0.0 | |
redhat/nodejs | <10.19.0 | 10.19.0 |
redhat/nodejs | <12.15.0 | 12.15.0 |
redhat/nodejs | <13.8.0 | 13.8.0 |
redhat/http-parser | <2.9.3 | 2.9.3 |
Nodejs Node.js | >=13.0.0<13.8.0 | |
debian/http-parser | 2.9.4-4+deb11u1 2.9.4-5 2.9.4-6 | |
debian/nodejs | 12.22.12~dfsg-1~deb11u4 12.22.12~dfsg-1~deb11u5 18.19.0+dfsg-6~deb12u2 18.19.0+dfsg-6~deb12u1 20.17.0+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Node.js HTTP request smuggling vulnerability is CVE-2019-15605.
CVE-2019-15605 has a severity level of high.
Versions 10, 12, and 13 of Node.js are affected by CVE-2019-15605.
CVE-2019-15605 can allow for malicious payload delivery when the transfer-encoding is malformed, potentially leading to unauthorized access or other security breaches.
To fix CVE-2019-15605 in Node.js, you should update to the recommended versions provided by the relevant software sources.