Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6547 | undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet will perform two requests in a single `request` API call: 1) `http://localhost:3000/` 2) `http://localhost:3000/foo2` This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround. |
Github GHSA |
GHSA-f772-66g8-q5h3 | Nodejs ‘undici’ vulnerable to CRLF Injection via Content-Type |
Tue, 22 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 08 Sep 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat acm |
|
| CPEs | cpe:/a:redhat:acm:2.4::el8 | |
| Vendors & Products |
Redhat
Redhat acm |
Mon, 19 Aug 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Redhat
Redhat acm |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T17:42:05.598Z
Reserved: 2022-07-15T00:00:00.000Z
Link: CVE-2022-35948
Updated: 2024-08-03T09:51:59.082Z
Status : Modified
Published: 2022-08-15T11:21:38.353
Modified: 2024-11-21T07:12:01.817
Link: CVE-2022-35948
OpenCVE Enrichment
No data.
EUVD
Github GHSA