Description
fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the application to crash. This issue has been addressed in commit `fbb07e8d` and will be included in release version 4.8.1. Users are advised to upgrade. Users unable to upgrade may manually filter out http content with malicious Content-Type headers.
Remediation
References
https://github.com/fastify/fastify/commit/fbb07e8dfad74c69cd4cd2211aedab87194618e3
https://github.com/fastify/fastify/security/advisories/GHSA-455w-c45v-86rg
https://github.com/fastify/fastify/security/policy
Related Vulnerabilities
CVE-2022-22965 Vulnerability in maven package org.springframework.boot:spring-boot-starter-web
CVE-2021-29444 Vulnerability in npm package jose-browser-runtime
CVE-2021-23424 Vulnerability in npm package ansi-html
CVE-2021-29369 Vulnerability in npm package gnuplot
CVE-2022-25167 Vulnerability in maven package org.apache.flume.flume-ng-sources:flume-jms-source