CVE-2024-30261

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*
cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*

History

18 Dec 2024, 19:21

Type Values Removed Values Added
CPE cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Fedoraproject fedora
Nodejs
Nodejs undici
Fedoraproject
References () https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055 - () https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055 - Patch
References () https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3 - () https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3 - Patch
References () https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672 - () https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672 - Vendor Advisory
References () https://hackerone.com/reports/2377760 - () https://hackerone.com/reports/2377760 - Exploit, Issue Tracking
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/ - Product
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/ - Product
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/ - Product

21 Nov 2024, 09:11

Type Values Removed Values Added
References () https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055 - () https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055 -
References () https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3 - () https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3 -
References () https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672 - () https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672 -
References () https://hackerone.com/reports/2377760 - () https://hackerone.com/reports/2377760 -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/ -

19 Apr 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/ -

12 Apr 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/ -
Summary
  • (es) Undici es un cliente HTTP/1.1, escrito desde cero para Node.js. Un atacante puede alterar la opción `integridad` pasada a `fetch()`, permitiendo que `fetch()` acepte solicitudes como válidas incluso si han sido manipuladas. Esta vulnerabilidad fue parcheada en las versiones 5.28.4 y 6.11.1.

04 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-04 15:15

Updated : 2024-12-18 19:21


NVD link : CVE-2024-30261

Mitre link : CVE-2024-30261

CVE.ORG link : CVE-2024-30261


JSON object : View

Products Affected

nodejs

  • undici

fedoraproject

  • fedora
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo