Description
Undici.ProxyAgent never verifies the remote server’s certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy’s URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-text HTTP between Undici and the proxy server.
Recommendation
Update the undici package to the latest compatible version. Followings are version details:
- Affected version(s): >= 4.8.2, <= 5.5.0
- Patched version(s): 5.5.1
References
Related Issues
- `undici.request` vulnerable to SSRF using absolute URL on `pathname` - CVE-2022-35949
- Nodejs ‘undici’ vulnerable to CRLF Injection via Content-Type - CVE-2022-35948
- undici before v5.8.0 vulnerable to CRLF injection in request headers - CVE-2022-31150
- undici before v5.8.0 vulnerable to uncleared cookies on cross-host / cross-origin redirect - CVE-2022-31151
- Tags:
- npm
- undici
Anything's wrong? Let us know Last updated on January 27, 2023