CVE Vulnerabilities

CVE-2023-23936

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Published: Feb 16, 2023 | Modified: Nov 21, 2024
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect host HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the headers.host string before passing to undici.

Weakness

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

Affected Software

NameVendorStart VersionEnd Version
Node.jsNodejs16.0.0 (including)16.19.1 (excluding)
Node.jsNodejs18.0.0 (including)18.14.1 (excluding)
Node.jsNodejs19.0.0 (including)19.6.1 (excluding)
UndiciNodejs2.0.0 (including)5.19.1 (excluding)
Red Hat Enterprise Linux 8RedHatnodejs:16-8070020230314140722.bd1311ed*
Red Hat Enterprise Linux 8RedHatnodejs:18-8070020230322080930.bd1311ed*
Red Hat Enterprise Linux 9RedHatnodejs:18-9020020230327152102.rhel9*
Red Hat Enterprise Linux 9RedHatnodejs-1:16.19.1-1.el9_2*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatnodejs-1:16.20.2-1.el9_0*
Node-undiciUbuntukinetic*
Node-undiciUbuntulunar*
Node-undiciUbuntutrusty*
Node-undiciUbuntuupstream*
Node-undiciUbuntuxenial*

Potential Mitigations

References