Show filters
234 Total Results
Displaying 81-90 of 234
Sort by:
Attacker Value
Unknown

CVE-2022-31151

Disclosure Date: July 21, 2022 (last updated February 24, 2025)
Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).
Attacker Value
Unknown

CVE-2022-31150

Disclosure Date: July 19, 2022 (last updated February 24, 2025)
undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue.
Attacker Value
Unknown

CVE-2022-32212

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.
Attacker Value
Unknown

CVE-2022-32210

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
`Undici.ProxyAgent` never verifies the remote server's certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy's URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-text HTTP between Undici and the proxy server.
Attacker Value
Unknown

CVE-2022-32223

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
Node.js is vulnerable to Hijack Execution Flow: DLL Hijacking under certain conditions on Windows platforms.This vulnerability can be exploited if the victim has the following dependencies on a Windows machine:* OpenSSL has been installed and “C:\Program Files\Common Files\SSL\openssl.cnf” exists.Whenever the above conditions are present, `node.exe` will search for `providers.dll` in the current user directory.After that, `node.exe` will try to search for `providers.dll` by the DLL Search Order in Windows.It is possible for an attacker to place the malicious file `providers.dll` under a variety of paths and exploit this vulnerability.
Attacker Value
Unknown

CVE-2022-32222

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
A cryptographic vulnerability exists on Node.js on linux in versions of 18.x prior to 18.40.0 which allowed a default path for openssl.cnf that might be accessible under some circumstances to a non-admin user instead of /etc/ssl as was the case in versions prior to the upgrade to OpenSSL 3.
Attacker Value
Unknown

CVE-2022-32213

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
Attacker Value
Unknown

CVE-2022-32215

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
Attacker Value
Unknown

CVE-2022-32214

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
Attacker Value
Unknown

CVE-2022-29354

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
An arbitrary file upload vulnerability in the file upload module of Keystone v4.2.1 allows attackers to execute arbitrary code via a crafted file.