First published: Thu Jul 14 2022(Updated: )
`Undici.ProxyAgent` never verifies the remote server's certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy's URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-text HTTP between Undici and the proxy server.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nodejs Undici | >=4.8.2<5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-32210.
The severity of CVE-2022-32210 is medium with a CVSS score of 6.5.
Node.js Undici versions 4.8.2 to 5.5.1 are affected by CVE-2022-32210.
This vulnerability allows proxies to perform Man-in-the-Middle attacks on HTTPS traffic and expose all request and response data.
Yes, you can find references for CVE-2022-32210 at the following links: [GitHub advisory](https://github.com/nodejs/undici/security/advisories/GHSA-pgw7-wx7w-2w33) and [HackerOne report](https://hackerone.com/reports/1583680).