undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue.
Metrics
Affected Vendors & Products
References
History
Sun, 08 Sep 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat acm |
|
CPEs | cpe:/a:redhat:acm:2.4::el8 | |
Vendors & Products |
Redhat
Redhat acm |
Mon, 19 Aug 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Redhat
Redhat acm |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T07:11:39.394Z
Reserved: 2022-05-18T00:00:00
Link: CVE-2022-31150

No data.

Status : Modified
Published: 2022-07-19T21:15:15.160
Modified: 2024-11-21T07:04:00.207
Link: CVE-2022-31150
