CVE Vulnerabilities

CVE-2023-23936

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Published: Feb 16, 2023 | Modified: Nov 21, 2024
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM

Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect host HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the headers.host string before passing to undici.

Weakness

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

Affected Software

Name Vendor Start Version End Version
Node.js Nodejs 16.0.0 (including) 16.19.1 (excluding)
Node.js Nodejs 18.0.0 (including) 18.14.1 (excluding)
Node.js Nodejs 19.0.0 (including) 19.6.1 (excluding)
Undici Nodejs 2.0.0 (including) 5.19.1 (excluding)
Red Hat Enterprise Linux 8 RedHat nodejs:16-8070020230314140722.bd1311ed *
Red Hat Enterprise Linux 8 RedHat nodejs:18-8070020230322080930.bd1311ed *
Red Hat Enterprise Linux 9 RedHat nodejs:18-9020020230327152102.rhel9 *
Red Hat Enterprise Linux 9 RedHat nodejs-1:16.19.1-1.el9_2 *
Red Hat Enterprise Linux 9.0 Extended Update Support RedHat nodejs-1:16.20.2-1.el9_0 *
Node-undici Ubuntu kinetic *
Node-undici Ubuntu lunar *
Node-undici Ubuntu trusty *
Node-undici Ubuntu upstream *
Node-undici Ubuntu xenial *

Potential Mitigations

References