HTTP Request Smuggling Affecting node package, versions [16.0.0,16.20.1) [18.0.0,18.16.1) [20.0.0,20.3.1)


0.0
medium

Snyk CVSS

    Attack Complexity Low

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.08% (33rd percentile)
Expand this section
NVD
7.5 high
Expand this section
SUSE
5.9 medium
Expand this section
Red Hat
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UPSTREAM-NODE-5741793
  • published 28 Jun 2023
  • disclosed 28 Jun 2023
  • credit Yadhu Krishna M

How to fix?

Upgrade node to version 16.20.1, 18.16.1, 20.3.1 or higher.

Overview

node is a JavaScript runtime built on Chrome's V8 JavaScript engine.

Affected versions of this package are vulnerable to HTTP Request Smuggling. The llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests.