Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w | vendor advisory |
https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf | patch |
https://github.com/nodejs/undici/releases/tag/v5.19.1 | release notes |
https://hackerone.com/bugs?report_id=1784449 | third party advisory permissions required |
https://security.netapp.com/advisory/ntap-20230324-0010/ |