Description
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
Remediation
References
https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034
https://github.com/nodejs/undici/releases/tag/v5.19.1
https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff
https://hackerone.com/reports/1820955
Related Vulnerabilities
CVE-2022-43427 Vulnerability in maven package com.compuware.jenkins:compuware-topaz-for-total-test
CVE-2021-41182 Vulnerability in maven package org.webjars.bower:jquery-ui
CVE-2024-4367 Vulnerability in maven package org.webjars.bowergithub.mozilla:pdfjs-dist
CVE-2019-10806 Vulnerability in npm package vega-util
CVE-2022-48285 Vulnerability in maven package org.webjars.npm:github-com-stuk-jszip