First published: Thu Jul 21 2022(Updated: )
undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue. <a href="https://github.com/nodejs/undici/security/advisories/GHSA-3cvr-822r-rqcc">https://github.com/nodejs/undici/security/advisories/GHSA-3cvr-822r-rqcc</a> <a href="https://hackerone.com/reports/409943">https://hackerone.com/reports/409943</a> <a href="https://github.com/nodejs/undici/releases/tag/v5.8.0">https://github.com/nodejs/undici/releases/tag/v5.8.0</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Node.js | <5.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2109354 is critical due to the potential for CRLF injection in HTTP headers.
To fix REDHAT-BUG-2109354, upgrade to undici version 5.8.0 or later.
REDHAT-BUG-2109354 affects undici versions lower than 5.7.1.
A workaround for REDHAT-BUG-2109354 is to sanitize all HTTP headers from untrusted sources to eliminate CRLF sequences.
Undici is an HTTP/1.1 client specifically designed for Node.js applications.