undici@6.2.1 vulnerabilities

An HTTP/1.1 client, written from scratch for Node.js

Direct Vulnerabilities

Known vulnerabilities in the undici package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Improper Authorization

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Improper Authorization due to improper handling of Proxy-Authorization headers during cross-origin redirects in certain methods. An attacker can exploit this behavior by inducing a victim to make a request that triggers a cross-origin redirect, potentially leaking sensitive information contained in the Proxy-Authorization header.

How to fix Improper Authorization?

Upgrade undici to version 5.28.4, 6.11.1 or higher.

<5.28.4 >=6.0.0 <6.11.1
  • L
Improper Access Control

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Improper Access Control due to the integrity option passed to fetch(). An attacker can alter this option, allowing fetch() to accept requests as valid even if they have been tampered with.

How to fix Improper Access Control?

Upgrade undici to version 5.28.4, 6.11.1 or higher.

<5.28.4 >=6.0.0 <6.11.1
  • M
Denial of Service (DoS)

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Denial of Service (DoS) due to the fetch(url) function not consuming the incoming body or consuming it very slowly.

How to fix Denial of Service (DoS)?

Upgrade undici to version 6.6.1 or higher.

>=6.0.0 <6.6.1
  • L
Permissive Cross-domain Policy with Untrusted Domains

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Permissive Cross-domain Policy with Untrusted Domains due to not clearing Proxy-Authentication headers on cross-origin redirects. An attacker can intercept the improperly cleared headers.

How to fix Permissive Cross-domain Policy with Untrusted Domains?

Upgrade undici to version 5.28.3, 6.6.1 or higher.

<5.28.3 >=6.0.0 <6.6.1