CVE-2022-32210 – undici
Package
Manager: npm
Name: undici
Vulnerable Version: >=4.8.2 <5.5.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
EPSS: 0.00107 pctl0.29491
Details
ProxyAgent vulnerable to MITM ### Description `Undici.ProxyAgent` never verifies the remote server's certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy's URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-text HTTP between Undici and the proxy server. ### Impact This affects all use of HTTPS via HTTP proxy using **`Undici.ProxyAgent`** with Undici or Node's global `fetch`. In this case, it removes all HTTPS security from all requests sent using Undici's `ProxyAgent`, allowing trivial MitM attacks by anybody on the network path between the client and the target server (local network users, your ISP, the proxy, the target server's ISP, etc). This less seriously affects HTTPS via HTTPS proxies. When you send HTTPS via a proxy to a remote server, the proxy can freely view or modify all HTTPS traffic unexpectedly (but only the proxy). ### Patches This issue was patched in Undici v5.5.1. ### Workarounds At the time of writing, the only workaround is to not use `ProxyAgent` as a dispatcher for TLS Connections.
Metadata
Created: 2022-06-17T01:02:29Z
Modified: 2022-07-29T18:13:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-pgw7-wx7w-2w33/GHSA-pgw7-wx7w-2w33.json
CWE IDs: ["CWE-295"]
Alternative ID: GHSA-pgw7-wx7w-2w33
Finding: F163
Auto approve: 1