Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6216 | undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue. |
Github GHSA |
GHSA-3cvr-822r-rqcc | undici before v5.8.0 vulnerable to CRLF injection in request headers |
Tue, 22 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 08 Sep 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat acm |
|
| CPEs | cpe:/a:redhat:acm:2.4::el8 | |
| Vendors & Products |
Redhat
Redhat acm |
Mon, 19 Aug 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Redhat
Redhat acm |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T17:48:45.328Z
Reserved: 2022-05-18T00:00:00.000Z
Link: CVE-2022-31150
Updated: 2024-08-03T07:11:39.394Z
Status : Modified
Published: 2022-07-19T21:15:15.160
Modified: 2024-11-21T07:04:00.207
Link: CVE-2022-31150
OpenCVE Enrichment
No data.
EUVD
Github GHSA