https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
The product does not properly control the allocation and maintenance of a limited resource.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://hackerone.com/reports/319532 | third party advisory exploit |