logo

CVE-2019-10196 http-proxy-agent

Package

Manager: npm
Name: http-proxy-agent
Vulnerable Version: >=0 <2.1.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00364 pctl0.57715

Details

Resource Exhaustion Denial of Service in http-proxy-agent A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.

Metadata

Created: 2022-01-06T20:30:13Z
Modified: 2021-03-31T21:09:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-86wf-436m-h424/GHSA-86wf-436m-h424.json
CWE IDs: ["CWE-665"]
Alternative ID: GHSA-86wf-436m-h424
Finding: F138
Auto approve: 1