Open appcues-wss[bot] opened 3 months ago
Library home page: https://registry.npmjs.org/undici/-/undici-6.16.1.tgz
Dependency Hierarchy: - expo-router-3.5.18.tgz (Root Library) - server-0.4.2.tgz - node-2.9.2.tgz - :x: **undici-6.16.1.tgz** (Vulnerable Library)
Found in base branch: main
Undici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the Node.js process. This has been patched in v6.19.2.
Publish Date: 2024-07-08
URL: CVE-2024-38372
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
Type: Upgrade version
Origin: https://github.com/nodejs/undici/security/advisories/GHSA-3g92-w8c5-73pq
Release Date: 2024-07-08
Fix Resolution: undici - 6.19.2
Vulnerable Library - expo-router-3.5.18.tgz
Vulnerabilities
Details
CVE-2024-38372
### Vulnerable Library - undici-6.16.1.tgzLibrary home page: https://registry.npmjs.org/undici/-/undici-6.16.1.tgz
Dependency Hierarchy: - expo-router-3.5.18.tgz (Root Library) - server-0.4.2.tgz - node-2.9.2.tgz - :x: **undici-6.16.1.tgz** (Vulnerable Library)
Found in base branch: main
### Vulnerability DetailsUndici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the Node.js process. This has been patched in v6.19.2.
Publish Date: 2024-07-08
URL: CVE-2024-38372
### CVSS 3 Score Details (2.0)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/nodejs/undici/security/advisories/GHSA-3g92-w8c5-73pq
Release Date: 2024-07-08
Fix Resolution: undici - 6.19.2