[23] Undici's fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect #443

Closed
opened 2024-06-24 18:39:18 +01:00 by Helpdesk · 0 comments
Member

Package: undici (npm)
Affected versions: < 5.28.4
Patched version: 5.28.4

https://github.com/Vylpes/vylbot-app/security/dependabot/23


Impact

If an attacker can alter the integrity option passed to fetch(), they can let fetch() accept requests as valid even if they have been temptered.

Patches

Fixed in nodejs/undici.
Fixes has been released in v5.28.4 and v6.11.1.

Workarounds

Ensure that integrity cannot be tamptered with.

References

Package: undici (npm) Affected versions: < 5.28.4 Patched version: 5.28.4 https://github.com/Vylpes/vylbot-app/security/dependabot/23 --- ## Impact If an attacker can alter the `integrity` option passed to `fetch()`, they can let `fetch()` accept requests as valid even if they have been temptered. ## Patches Fixed in [nodejs/undici](https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3). Fixes has been released in v5.28.4 and v6.11.1. ## Workarounds Ensure that `integrity` cannot be tamptered with. ## References - https://hackerone.com/reports/2377760
Helpdesk added the
type
alert
label 2024-06-24 18:39:18 +01:00
Vylpes added this to the (deleted) milestone 2024-06-24 18:48:35 +01:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: RabbitLabs/vylbot-app#443
No description provided.