2024-04-04 16:03:24 +00:00
{
"id" : "CVE-2024-30261" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2024-04-04T15:15:39.460" ,
2024-04-19 23:58:22 +00:00
"lastModified" : "2024-04-19T23:15:11.137" ,
2024-04-04 18:03:33 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-04-04 16:03:24 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1."
2024-04-07 02:03:21 +00:00
} ,
{
"lang" : "es" ,
"value" : "Undici es un cliente HTTP/1.1, escrito desde cero para Node.js. Un atacante puede alterar la opci\u00f3n `integridad` pasada a `fetch()`, permitiendo que `fetch()` acepte solicitudes como v\u00e1lidas incluso si han sido manipuladas. Esta vulnerabilidad fue parcheada en las versiones 5.28.4 y 6.11.1."
2024-04-04 16:03:24 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 2.6 ,
"baseSeverity" : "LOW"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 1.4
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-284"
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055" ,
"source" : "security-advisories@github.com"
} ,
{
"url" : "https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3" ,
"source" : "security-advisories@github.com"
} ,
{
"url" : "https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672" ,
"source" : "security-advisories@github.com"
} ,
{
"url" : "https://hackerone.com/reports/2377760" ,
"source" : "security-advisories@github.com"
2024-04-12 04:03:27 +00:00
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/" ,
"source" : "security-advisories@github.com"
} ,
2024-04-19 23:58:22 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/" ,
"source" : "security-advisories@github.com"
} ,
2024-04-12 04:03:27 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/" ,
"source" : "security-advisories@github.com"
2024-04-04 16:03:24 +00:00
}
]
}