undici@4.12.2 vulnerabilities

An HTTP/1.1 client, written from scratch for Node.js

Direct Vulnerabilities

Known vulnerabilities in the undici package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Improper Authorization

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Improper Authorization due to improper handling of Proxy-Authorization headers during cross-origin redirects in certain methods. An attacker can exploit this behavior by inducing a victim to make a request that triggers a cross-origin redirect, potentially leaking sensitive information contained in the Proxy-Authorization header.

How to fix Improper Authorization?

Upgrade undici to version 5.28.4, 6.11.1 or higher.

<5.28.4 >=6.0.0 <6.11.1
  • L
Improper Access Control

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Improper Access Control due to the integrity option passed to fetch(). An attacker can alter this option, allowing fetch() to accept requests as valid even if they have been tampered with.

How to fix Improper Access Control?

Upgrade undici to version 5.28.4, 6.11.1 or higher.

<5.28.4 >=6.0.0 <6.11.1
  • L
Permissive Cross-domain Policy with Untrusted Domains

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Permissive Cross-domain Policy with Untrusted Domains due to not clearing Proxy-Authentication headers on cross-origin redirects. An attacker can intercept the improperly cleared headers.

How to fix Permissive Cross-domain Policy with Untrusted Domains?

Upgrade undici to version 5.28.3, 6.6.1 or higher.

<5.28.3 >=6.0.0 <6.6.1
  • L
Information Exposure

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Information Exposure during the Cookie headers handling process. An attacker can potentially leak sensitive information to a third-party site or a malicious actor who can control the redirection target (i.e., an open redirector) by exploiting the disconnect between the spec's assumptions and the implementation of fetch.

Note:

This is only exploitable if the attacker can control the redirection target.

How to fix Information Exposure?

Upgrade undici to version 5.26.2 or higher.

<5.26.2
  • H
Regular Expression Denial of Service (ReDoS)

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the Headers.set() and Headers.append() methods, when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the headerValueNormalize() utility function.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade undici to version 5.19.1 or higher.

<5.19.1
  • M
CRLF Injection

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to CRLF Injection due to missing protection for the host HTTP header.

How to fix CRLF Injection?

Upgrade undici to version 5.19.1 or higher.

>=2.0.0 <5.19.1
  • M
CRLF Injection

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to CRLF Injection when using unsanitized input as request headers (for example, inside the content-type header).

How to fix CRLF Injection?

Upgrade undici to version 5.8.2 or higher.

<5.8.2
  • M
Server-side Request Forgery (SSRF)

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) when an application takes in unsanitized user input into the path/pathname option of undici.request.

How to fix Server-side Request Forgery (SSRF)?

Upgrade undici to version 5.8.2 or higher.

<5.8.2
  • L
Information Exposure

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Information Exposure by not clearing cookie headers upon third party redirect.

Note: This is only exploitable when maxRedirections is changed from its default value of 0.

How to fix Information Exposure?

Upgrade undici to version 5.8.0 or higher.

<5.8.0
  • M
CRLF Injection

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to CRLF Injection in lib/core/request.js that allows HTTP requests to be injected via unexpected CRLF (\r\n) sequences in request path, method, and headers received from untrusted sources.

How to fix CRLF Injection?

Upgrade undici to version 5.8.0 or higher.

<5.8.0
  • M
Improper Certificate Validation

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to Improper Certificate Validation due to Undici.ProxyAgent missing verification of the remote server's certificate, which leads to exposure of all the requests and responses data to the proxy.

How to fix Improper Certificate Validation?

Upgrade undici to version 5.5.1 or higher.

>=4.8.2 <5.5.1