Description
Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
Published: 2018-11-28
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-4094 Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
Ubuntu USN Ubuntu USN USN-4796-1 Node.js vulnerabilities
History

No history.

Subscriptions

Nodejs Node.js
Redhat Rhel Software Collections
Suse Suse Enterprise Storage Suse Linux Enterprise Server Suse Openstack Cloud
cve-icon MITRE

Status: PUBLISHED

Assigner: nodejs

Published:

Updated: 2024-08-05T08:24:03.673Z

Reserved: 2018-06-11T00:00:00.000Z

Link: CVE-2018-12116

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-28T17:29:00.230

Modified: 2024-11-21T03:44:37.917

Link: CVE-2018-12116

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-11-27T00:00:00Z

Links: CVE-2018-12116 - Bugzilla

cve-icon OpenCVE Enrichment

No data.