Description
fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the application to crash. This issue has been addressed in commit `fbb07e8d` and will be included in release version 4.8.1. Users are advised to upgrade. Users unable to upgrade may manually filter out http content with malicious Content-Type headers.
Remediation
References
https://github.com/fastify/fastify/commit/fbb07e8dfad74c69cd4cd2211aedab87194618e3
https://github.com/fastify/fastify/security/advisories/GHSA-455w-c45v-86rg
https://github.com/fastify/fastify/security/policy
Related Vulnerabilities
CVE-2021-21321 Vulnerability in npm package fastify-reply-from
CVE-2021-32738 Vulnerability in npm package stellar-sdk
CVE-2020-7642 Vulnerability in npm package lazysizes
CVE-2021-22135 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2021-44906 Vulnerability in maven package org.webjars.bowergithub.substack:minimist