### [CVE-2022-39288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39288) ![](https://img.shields.io/static/v1?label=Product&message=fastify&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions&color=brighgreen) ### Description fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the application to crash. This issue has been addressed in commit `fbb07e8d` and will be included in release version 4.8.1. Users are advised to upgrade. Users unable to upgrade may manually filter out http content with malicious Content-Type headers. ### POC #### Reference - https://github.com/fastify/fastify/security/policy #### Github No PoCs found on GitHub currently.