[22] [LOW] undici Denial of Service attack via bad certificate data #462

Open
opened 2025-06-04 22:11:19 +01:00 by Vylpes · 1 comment
Owner

Package: undici
Affected versions: >= 6.0.0, < 6.21.2
Patched version: 6.21.2


Impact

Applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak.

Patches

This has been patched in nodejs/undici#4088.

Workarounds

If a webhook fails, avoid keep calling it repeatedly.

Package: `undici` Affected versions: `>= 6.0.0, < 6.21.2` Patched version: `6.21.2` --- ## Impact Applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak. ## Patches This has been patched in nodejs/undici#4088. ## Workarounds If a webhook fails, avoid keep calling it repeatedly.
Vylpes added this to the 0.10.0 milestone 2025-06-04 22:11:19 +01:00
Vylpes added the
type
alert
label 2025-06-04 22:11:19 +01:00
Author
Owner

Upgrade undici to version 6.21.2 or later. For example:

undici@^6.21.2:
  version "6.21.2"
Upgrade undici to version 6.21.2 or later. For example: ``` undici@^6.21.2: version "6.21.2" ```
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: External/card-drop#462
No description provided.