ghsa-w7rc-rwvf-8q5r
Vulnerability from github
Impact
Node Fetch did not honor the size
option after following a redirect, which means that when a content size was over the limit, a FetchError
would never get thrown and the process would end without failure.
For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after fetch()
has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.
Patches
We released patched versions for both stable and beta channels:
- For
v2
: 2.6.1 - For
v3
: 3.0.0-beta.9
Workarounds
None, it is strongly recommended to update as soon as possible.
For more information
If you have any questions or comments about this advisory: * Open an issue in node-fetch * Contact one of the core maintainers.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "node-fetch" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "fixed": "2.6.1" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 3.0.0-beta.8" }, "package": { "ecosystem": "npm", "name": "node-fetch" }, "ranges": [ { "events": [ { "introduced": "3.0.0-beta.1" }, { "fixed": "3.0.0-beta.9" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-15168" ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2020-09-10T17:44:09Z", "nvd_published_at": null, "severity": "LOW" }, "details": "### Impact\nNode Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure.\n\nFor most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don\u0027t double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.\n\n### Patches\nWe released patched versions for both stable and beta channels:\n\n- For `v2`: 2.6.1\n- For `v3`: 3.0.0-beta.9\n\n### Workarounds\nNone, it is strongly recommended to update as soon as possible.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=\u0026labels=question\u0026template=support-or-usage.md\u0026title=Question%3A+)\n* Contact one of the core maintainers.", "id": "GHSA-w7rc-rwvf-8q5r", "modified": "2024-07-15T19:46:22Z", "published": "2020-09-10T17:46:21Z", "references": [ { "type": "WEB", "url": "https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15168" }, { "type": "WEB", "url": "https://github.com/node-fetch/node-fetch/commit/2358a6c2563d1730a0cdaccc197c611949f6a334" }, { "type": "WEB", "url": "https://github.com/node-fetch/node-fetch/commit/eaff0094c4dfdd5b78711a8c4f1b61e33d282072" }, { "type": "PACKAGE", "url": "https://github.com/node-fetch/node-fetch" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ], "summary": "The `size` option isn\u0027t honored after following a redirect in node-fetch" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.