Undici's fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect [LOW] [7] #197

Closed
opened 2024-04-08 15:19:08 +01:00 by Helpdesk · 0 comments
Member

Package: undici (npm)
Affected versions: < 5.28.4
Patched versions: 5.28.4


Impact

If an attacker can alter the integrity option passed to fetch(), they can let fetch() accept requests as valid even if they have been tempered.

Patches

Fixes has been released in v5.28.4 and v6.11.1.

Workarounds

Ensure that integrity cannot be tampered with.

References

https://hackerone.com/reports/2377760

Package: undici (npm) Affected versions: < 5.28.4 Patched versions: 5.28.4 --- ## Impact If an attacker can alter the `integrity` option passed to `fetch()`, they can let `fetch()` accept requests as valid even if they have been tempered. ## Patches Fixes has been released in v5.28.4 and v6.11.1. ## Workarounds Ensure that `integrity` cannot be tampered with. ## References https://hackerone.com/reports/2377760
Helpdesk added the
type
dependencies
label 2024-04-08 15:19:08 +01:00
Vylpes added this to the 0.7.0 milestone 2024-06-03 18:18:21 +01:00
Vylpes added this to the 0.7 Sprint 2 project 2024-06-16 15:43:21 +01:00
Vylpes self-assigned this 2024-06-16 15:43:38 +01:00
Vylpes started working 2024-06-18 18:19:44 +01:00
Vylpes stopped working 2024-06-18 18:22:05 +01:00
2 minutes 21 seconds
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Total time spent: 2 minutes 21 seconds
Vylpes
2 minutes 21 seconds
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: External/card-drop#197
No description provided.