Description
Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-4094 | Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server. |
Ubuntu USN |
USN-4796-1 | Node.js vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: nodejs
Published:
Updated: 2024-08-05T08:24:03.673Z
Reserved: 2018-06-11T00:00:00.000Z
Link: CVE-2018-12116
No data.
Status : Modified
Published: 2018-11-28T17:29:00.230
Modified: 2024-11-21T03:44:37.917
Link: CVE-2018-12116
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN