cve/2018/CVE-2018-3739.md

18 lines
749 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-3739](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3739)
![](https://img.shields.io/static/v1?label=Product&message=https-proxy-agent%20node%20module&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20Service%20(CWE-400)&color=brighgreen)
### Description
https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/seal-community/patches