Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff | vendor advisory |
https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034 | patch |
https://hackerone.com/reports/1820955 | third party advisory exploit |
https://github.com/nodejs/undici/releases/tag/v5.19.1 | release notes |