Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/node-undici@5.8.2%2Bdfsg1%2B~cs18.9.18.1-1?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | node-undici |
| Version | 5.8.2+dfsg1+~cs18.9.18.1-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1 |
| Latest_non_vulnerable_version | 7.24.6+dfsg+~cs3.2.0-2 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-g4wu-n75v-p7ad |
| vulnerability_id |
VCID-g4wu-n75v-p7ad |
| summary |
`undici.request` vulnerable to SSRF using absolute URL on `pathname`
### Impact
`undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`.
If a user specifies a URL such as `http://127.0.0.1` or `//127.0.0.1`
```js
const undici = require("undici")
undici.request({origin: "http://example.com", pathname: "//127.0.0.1"})
```
Instead of processing the request as `http://example.org//127.0.0.1` (or `http://example.org/http://127.0.0.1` when `http://127.0.0.1 is used`), it actually processes the request as `http://127.0.0.1/` and sends it to `http://127.0.0.1`.
If a developer passes in user input into `path` parameter of `undici.request`, it can result in an _SSRF_ as they will assume that the hostname cannot change, when in actual fact it can change because the specified path parameter is combined with the base URL.
### Patches
This issue was fixed in `undici@5.8.1`.
### Workarounds
The best workaround is to validate user input before passing it to the `undici.request` call.
## For more information
If you have any questions or comments about this advisory:
- Open an issue in [undici repository](https://github.com/nodejs/undici/issues)
- To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35949 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60075 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59997 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60022 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59992 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60056 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60077 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60061 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60044 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60083 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.6009 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35949 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-35949, GHSA-8qr4-xgw6-wmr3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g4wu-n75v-p7ad |
|
| 1 |
| url |
VCID-rskk-s95c-rfgz |
| vulnerability_id |
VCID-rskk-s95c-rfgz |
| summary |
Nodejs ‘undici’ vulnerable to CRLF Injection via Content-Type
### Impact
`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header.
Example:
```
import { request } from 'undici'
const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1'
await request('http://localhost:3000, {
method: 'GET',
headers: {
'content-type': unsanitizedContentTypeInput
},
})
```
The above snippet will perform two requests in a single `request` API call:
1) `http://localhost:3000/`
2) `http://localhost:3000/foo2`
### Patches
This issue was patched in Undici v5.8.1
### Workarounds
Sanitize input when sending content-type headers using user input.
## For more information
If you have any questions or comments about this advisory:
- Open an issue in [undici repository](https://github.com/nodejs/undici/issues)
- To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35948 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37395 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.3745 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37421 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37448 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37552 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37468 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37455 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37404 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37576 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37482 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35948 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-35948, GHSA-f772-66g8-q5h3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rskk-s95c-rfgz |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.8.2%252Bdfsg1%252B~cs18.9.18.1-1%3Fdistro=trixie |