Undici's fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect
- Severity:
- Low
Description
If an attacker can alter the integrity option passed to fetch(), they can let fetch() accept requests as valid even if they have been tampered.
Recommendation
Update the undici package to the latest compatible version. Followings are version details:
Affected version(s): **>= 6.0.0, < 6.11.1 < 5.28.4** Patched version(s): **6.11.1 5.28.4**
References
- GHSA-9qxr-qj54-h672
- hackerone.com
- lists.fedoraproject.org
- CVE-2024-30261
- CWE-284
- CAPEC-310
- OWASP 2021-A1
- OWASP 2021-A6
Related Issues
- undici Denial of Service attack via bad certificate data - CVE-2025-47279
- Use of Insufficiently Random Values in undici - CVE-2025-22150
- fetch(url) leads to a memory leak in undici - CVE-2024-24750
- Saltcorn Server allows logged-in users to delete arbitrary files because of a path traversal vulnerability - CVE-2024-47818
- Tags:
- npm
- undici
Anything's wrong? Let us know Last updated on April 29, 2024