Description
https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0249 | https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON). |
Github GHSA |
GHSA-8g7p-74h8-hg48 | Denial of Service in https-proxy-agent |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T04:25:44.584Z
Reserved: 2017-12-28T00:00:00.000Z
Link: CVE-2018-3739
No data.
Status : Modified
Published: 2018-06-07T02:29:08.973
Modified: 2024-11-21T04:05:59.100
Link: CVE-2018-3739
OpenCVE Enrichment
No data.
EUVD
Github GHSA