Vulnerability Details : CVE-2024-30261
Potential exploit
Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.
Products affected by CVE-2024-30261
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-30261
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-30261
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N |
2.1
|
1.4
|
NIST | 2024-12-18 |
2.6
|
LOW | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N |
1.2
|
1.4
|
GitHub, Inc. | 2024-04-04 |
2.6
|
LOW | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N |
N/A
|
N/A
|
RedHat-CVE-2024-30261 | 2024-04-05 |
CWE ids for CVE-2024-30261
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2024-30261
-
https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3
Merge pull request from GHSA-9qxr-qj54-h672 · nodejs/undici@d542b8c · GitHubPatch
-
https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672
fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect · Advisory · nodejs/undici · GitHubVendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/
[SECURITY] Fedora 38 Update: nodejs-undici-6.11.1-2.fc38 - package-announce - Fedora Mailing-ListsProduct
-
https://hackerone.com/reports/2377760
Sign in | HackerOneExploit;Issue Tracking
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/
[SECURITY] Fedora 39 Update: nodejs-undici-6.11.1-2.fc39 - package-announce - Fedora Mailing-ListsProduct
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/
[SECURITY] Fedora 40 Update: nodejs-undici-6.11.1-2.fc40 - package-announce - Fedora Mailing-ListsProduct
-
https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055
Merge pull request from GHSA-9qxr-qj54-h672 · nodejs/undici@2b39440 · GitHubPatch
Jump to