Description
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
Remediation
References
https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf
https://github.com/nodejs/undici/releases/tag/v5.19.1
https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w
https://hackerone.com/bugs?report_id=1784449
https://security.netapp.com/advisory/ntap-20230324-0010/
Related Vulnerabilities
CVE-2020-7780 Vulnerability in maven package com.softwaremill.akka-http-session:core_2.12
CVE-2021-21294 Vulnerability in maven package org.http4s:http4s-blaze-server_2.13
CVE-2018-19048 Vulnerability in npm package simditor
CVE-2017-1000491 Vulnerability in npm package shiba
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-parent