Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jul 1, 2023

Note: This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
undici (source) 5.12.0 -> 5.29.0 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2023-23936

Impact

undici library does not protect host HTTP header from CRLF injection vulnerabilities.

Patches

This issue was patched in Undici v5.19.1.

Workarounds

Sanitize the headers.host string before passing to undici.

References

Reported at https://hackerone.com/reports/1820955.

Credits

Thank you to Zhipeng Zhang (@​timon8) for reporting this vulnerability.

CVE-2023-24807

Impact

The Headers.set() and Headers.append() methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the headerValueNormalize() utility function.

Patches

This vulnerability was patched in v5.19.1.

Workarounds

There is no workaround. Please update to an unaffected version.

References

Credits

Carter Snook reported this vulnerability.

CVE-2023-45143

Impact

Undici clears Authorization headers on cross-origin redirects, but does not clear Cookie headers. By design, cookie headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since Undici handles headers more liberally than the specification, there was a disconnect from the assumptions the spec made, and Undici's implementation of fetch.

As such this may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site.

Patches

This was patched in e041de359221ebeae04c469e8aff4145764e6d76, which is included in version 5.26.2.

CVE-2024-24758

Impact

Undici already cleared Authorization headers on cross-origin redirects, but did not clear Proxy-Authorization headers.

Patches

This is patched in v5.28.3 and v6.6.1

Workarounds

There are no known workarounds.

References

CVE-2024-30261

Impact

If an attacker can alter the integrity option passed to fetch(), they can let fetch() accept requests as valid even if they have been tampered.

Patches

Fixed in nodejs/undici@d542b8c.
Fixes has been released in v5.28.4 and v6.11.1.

Workarounds

Ensure that integrity cannot be tampered with.

References

https://hackerone.com/reports/2377760

CVE-2024-30260

Impact

Undici cleared Authorization and Proxy-Authorization headers for fetch(), but did not clear them for undici.request().

Patches

This has been patched in nodejs/undici@6805746.
Fixes has been released in v5.28.4 and v6.11.1.

Workarounds

use fetch() or disable maxRedirections.

References

Linzi Shang reported this.

CVE-2025-22150

Impact

Undici fetch() uses Math.random() to choose the boundary for a multipart/form-data request. It is known that the output of Math.random() can be predicted if several of its generated values are known.

If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, An attacker can tamper with the requests going to the backend APIs if certain conditions are met.

Patches

This is fixed in 5.28.5; 6.21.1; 7.2.3.

Workarounds

Do not issue multipart requests to attacker controlled servers.

References

CVE-2025-47279

Impact

Applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak.

Patches

This has been patched in https://github.com/nodejs/undici/pull/4088.

Workarounds

If a webhook fails, avoid keep calling it repeatedly.

References

Reported as: https://github.com/nodejs/undici/issues/3895


Release Notes

nodejs/undici (undici)

v5.29.0

Compare Source

What's Changed

Full Changelog: nodejs/undici@v5.28.5...v5.29.0

v5.28.5

Compare Source

⚠️ Security Release ⚠️

Fixes CVE CVE-2025-22150 GHSA-c76h-2ccp-4975 (embargoed until 22-01-2025).

Full Changelog: nodejs/undici@v5.28.4...v5.28.5

v5.28.4

Compare Source

⚠️ Security Release ⚠️

Full Changelog: nodejs/undici@v5.28.3...v5.28.4

v5.28.3

Compare Source

⚠️ Security Release ⚠️

Fixes:

Full Changelog: nodejs/undici@v5.28.2...v5.28.3

v5.28.2

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.28.1...v5.28.2

v5.28.1

Compare Source

What's Changed

Full Changelog: nodejs/undici@v5.28.0...v5.28.1

v5.28.0

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.27.2...v5.28.0

v5.27.2

Compare Source

Full Changelog: nodejs/undici@v5.27.1...v5.27.2

v5.27.1

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.27.0...v5.27.1

v5.27.0

Compare Source

What's Changed

Full Changelog: nodejs/undici@v5.26.5...v5.27.0

v5.26.5

Compare Source

What's Changed

Full Changelog: nodejs/undici@v5.26.4...v5.26.5

v5.26.4

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.26.3...v5.26.4

v5.26.3

Compare Source

v5.26.2

Compare Source

Security Release, CVE-2023-45143.

v5.26.1

Compare Source

What's Changed

Full Changelog: nodejs/undici@v5.26.0...v5.26.1

v5.26.0

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.23.4...v5.26.0

v5.25.4

Compare Source

v5.25.3

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.25.2...v5.25.3

v5.25.2

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.25.1...v5.25.2

v5.25.1

Compare Source

What's Changed

Full Changelog: nodejs/undici@v5.25.0...v5.25.1

v5.25.0

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.24.0...v5.25.0

v5.24.0

Compare Source

Notable Changes

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.23.0...v5.24.0

v5.23.0

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.22.1...v5.23.0

v5.22.1

Compare Source

What's Changed

New Contributors

Full Changelog: nodejs/undici@v5.22.0...v5.22.1

v5.22.0

Compare Source

What's Changed

Full Changelog: nodejs/undici@v5.21.2...v5.22.0

v5.21.2

Compare Source

What's Changed

Full Changelog: nodejs/undici@v5.21.1...v5.21.2

v5.21.1

Compare Source

What's Changed


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the dependencies Pull requests that update a dependency file label Jul 1, 2023
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from 3bfbf54 to f834b17 Compare August 9, 2023 13:33
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch 2 times, most recently from 6f65152 to b5c37e9 Compare September 26, 2023 12:22
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch 2 times, most recently from 39de66d to 8c6865c Compare October 15, 2023 15:42
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.19.1 [security] chore(deps): update dependency undici to v5.26.2 [security] Oct 16, 2023
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from 8c6865c to f2566d8 Compare October 23, 2023 16:39
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.26.2 [security] chore(deps): update dependency undici to v5.19.1 [security] Oct 25, 2023
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.19.1 [security] chore(deps): update dependency undici to v5.26.2 [security] Oct 27, 2023
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from f2566d8 to 0fb4cb7 Compare October 27, 2023 21:24
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from 0fb4cb7 to a0fe5dc Compare November 6, 2023 06:17
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from a0fe5dc to 319ce77 Compare November 16, 2023 09:31
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from 319ce77 to 3e594ed Compare December 3, 2023 09:05
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from 3e594ed to b97833f Compare February 16, 2024 18:39
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.26.2 [security] chore(deps): update dependency undici to v5.28.3 [security] Feb 16, 2024
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from b97833f to ae5611f Compare April 4, 2024 16:17
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.28.3 [security] chore(deps): update dependency undici to v5.28.4 [security] Apr 4, 2024
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.28.4 [security] chore(deps): update dependency undici to v5.28.4 [security] - autoclosed Dec 8, 2024
@renovate renovate bot closed this Dec 8, 2024
@renovate renovate bot deleted the renovate/npm-undici-vulnerability branch December 8, 2024 19:00
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.28.4 [security] - autoclosed chore(deps): update dependency undici to v5.28.4 [security] Dec 8, 2024
@renovate renovate bot reopened this Dec 8, 2024
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from 654ad59 to ae5611f Compare December 8, 2024 21:32
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from ae5611f to 3dd7f69 Compare January 22, 2025 00:42
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.28.4 [security] chore(deps): update dependency undici to v5.28.5 [security] Jan 22, 2025
@renovate renovate bot force-pushed the renovate/npm-undici-vulnerability branch from 3dd7f69 to 7f42411 Compare April 1, 2025 11:26
@renovate renovate bot changed the title chore(deps): update dependency undici to v5.28.5 [security] chore(deps): update dependency undici to v5.29.0 [security] May 15, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant