-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2024-24758 - Low Severity Vulnerability
Vulnerable Library - undici-5.7.0.tgz
An HTTP/1.1 client, written from scratch for Node.js
Library home page: https://registry.npmjs.org/undici/-/undici-5.7.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/undici/package.json
Dependency Hierarchy:
- rest-0.6.0.tgz (Root Library)
- ❌ undici-5.7.0.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear Proxy-Authentication headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Publish Date: 2024-02-16
URL: CVE-2024-24758
CVSS 3 Score Details (3.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: High
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-24758
Release Date: 2024-02-16
Fix Resolution (undici): 5.28.3
Direct dependency fix Resolution (@discordjs/rest): 1.0.0
Step up your Open Source Security Game with Mend here