CVE Vulnerabilities

CVE-2022-35948

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Aug 15, 2022 | Modified: Mar 28, 2023
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

undici is an HTTP/1.1 client, written from scratch for Node.js.=< undici@5.8.0 users are vulnerable to CRLF Injection on headers when using unsanitized input as request headers, more specifically, inside the content-type header. Example: import { request } from undici const unsanitizedContentTypeInput = application/jsonrnrnGET /foo2 HTTP/1.1 await request(http://localhost:3000, { method: GET, headers: { content-type: unsanitizedContentTypeInput }, }) The above snippet will perform two requests in a single request API call: 1) http://localhost:3000/ 2) http://localhost:3000/foo2 This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Undici Nodejs * 5.8.2 (excluding)

Potential Mitigations

References