125 Star 4 Fork 50

src-openEuler/nodejs

 / 详情

CVE-2024-30260

已完成
CVE和安全问题 拥有者
创建于  
2024-09-15 10:50

一、漏洞信息
漏洞编号:CVE-2024-30260
漏洞归属组件:nodejs
漏洞归属的版本:10.11.0,10.21.0,12.18.4,12.22.11,16.14.2,16.15.0,18.16.0,18.17.1,20.11.1
CVSS V3.0分值:
BaseScore:3.9 Low
Vector:CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
漏洞简述:
Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for fetch(), but did not clear them for undici.request(). This vulnerability was patched in version(s) 5.28.4 and 6.11.1.
漏洞公开时间:2024-04-05 00:15:08
漏洞创建时间:2024-09-15 18:50:04
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2024-30260

更多参考(点击展开)
参考来源 参考链接 来源链接
security-advisories.github.com https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f
security-advisories.github.com https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
security-advisories.github.com https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7
security-advisories.github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/
security-advisories.github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/
security-advisories.github.com https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-30260 https://bugzilla.suse.com/show_bug.cgi?id=1222530
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2024-30260 https://bugzilla.suse.com/show_bug.cgi?id=1222530
suse_bugzilla https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f https://bugzilla.suse.com/show_bug.cgi?id=1222530
suse_bugzilla https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 https://bugzilla.suse.com/show_bug.cgi?id=1222530
suse_bugzilla https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7 https://bugzilla.suse.com/show_bug.cgi?id=1222530
suse_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2273522 https://bugzilla.suse.com/show_bug.cgi?id=1222530
redhat_bugzilla https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f https://bugzilla.redhat.com/show_bug.cgi?id=2273522
redhat_bugzilla https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 https://bugzilla.redhat.com/show_bug.cgi?id=2273522
redhat_bugzilla https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7 https://bugzilla.redhat.com/show_bug.cgi?id=2273522
ubuntu https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7 https://ubuntu.com/security/CVE-2024-30260
ubuntu https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f (v5.28.4) https://ubuntu.com/security/CVE-2024-30260
ubuntu https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 (v6.11.1) https://ubuntu.com/security/CVE-2024-30260
ubuntu https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f https://ubuntu.com/security/CVE-2024-30260
ubuntu https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 https://ubuntu.com/security/CVE-2024-30260
ubuntu https://www.cve.org/CVERecord?id=CVE-2024-30260 https://ubuntu.com/security/CVE-2024-30260
ubuntu https://nvd.nist.gov/vuln/detail/CVE-2024-30260 https://ubuntu.com/security/CVE-2024-30260
ubuntu https://launchpad.net/bugs/cve/CVE-2024-30260 https://ubuntu.com/security/CVE-2024-30260
ubuntu https://security-tracker.debian.org/tracker/CVE-2024-30260 https://ubuntu.com/security/CVE-2024-30260
debian https://security-tracker.debian.org/tracker/CVE-2024-30260
cve_search https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7
cve_search https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f
cve_search https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/
github_advisory https://hackerone.com/reports/2408074 https://github.com/advisories/GHSA-m4v8-wqvr-p9f7
github_advisory https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f https://github.com/advisories/GHSA-m4v8-wqvr-p9f7
github_advisory https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7 https://github.com/advisories/GHSA-m4v8-wqvr-p9f7
github_advisory https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 https://github.com/advisories/GHSA-m4v8-wqvr-p9f7
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2024-30260 https://explore.alas.aws.amazon.com/CVE-2024-30260.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30260 https://explore.alas.aws.amazon.com/CVE-2024-30260.html
snyk https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f https://security.snyk.io/vuln/SNYK-JS-UNDICI-6564964
snyk https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 https://security.snyk.io/vuln/SNYK-JS-UNDICI-6564964
snyk https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6591105
snyk https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6591105

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f security-advisories.github.com
https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 security-advisories.github.com
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f suse_bugzilla
https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 suse_bugzilla
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f redhat_bugzilla
https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 redhat_bugzilla
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f (v5.28.4) ubuntu
https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 (v6.11.1) ubuntu
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f ubuntu
https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 ubuntu
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f github_advisory
https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 github_advisory
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f snyk
https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75 snyk

二、漏洞分析结构反馈
影响性分析说明:
Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for fetch(), but did not clear them for undici.request(). This vulnerability was patched in version(s) 5.28.4 and 6.11.1.
openEuler评分:
3.9
Vector:CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
受影响版本排查(受影响/不受影响):
1.master(20.11.1):受影响
2.openEuler-24.03-LTS(20.11.1):受影响
3.openEuler-24.03-LTS-Next(20.11.1):受影响
4.openEuler-20.03-LTS-SP4(12.22.11):不受影响
5.openEuler-22.03-LTS-SP1(12.22.11):不受影响
6.openEuler-22.03-LTS-SP3(12.22.11):不受影响
7.openEuler-22.03-LTS-SP4(12.22.11):不受影响

修复是否涉及abi变化(是/否):
1.master(20.11.1):是
2.openEuler-24.03-LTS(20.11.1):是
3.openEuler-24.03-LTS-Next(20.11.1):是
4.openEuler-20.03-LTS-SP4(12.22.11):否
5.openEuler-22.03-LTS-SP1(12.22.11):否
6.openEuler-22.03-LTS-SP3(12.22.11):否
7.openEuler-22.03-LTS-SP4(12.22.11):否

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2024-2174

评论 (9)

openeuler-ci-bot 创建了CVE和安全问题 7个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
7个月前
展开全部操作日志
openeuler-ci-bot 添加了
 
sig/sig-nodejs
标签
7个月前
参考网址 关联pr 状态 补丁链接
https://nvd.nist.gov/vuln/detail/CVE-2024-30260NoneNonehttps://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f
https://ubuntu.com/security/CVE-2024-30260NoneNonehttps://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
https://discourse.ubuntu.com/c/ubuntu-pro
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f
https://www.opencve.io/cve/CVE-2024-30260NoneNonehttps://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-30260NoneNonehttps://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f
https://security-tracker.debian.org/tracker/CVE-2024-30260NoneNonehttps://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f

说明:补丁链接仅供初步排查参考,实际可用性请人工再次确认,补丁下载验证可使用CVE补丁工具
若补丁不准确,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 反馈正确信息,便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot 计划开始日期设置为2024-09-15 7个月前
openeuler-ci-bot 计划截止日期设置为2024-10-15 7个月前
openeuler-ci-bot 优先级设置为不重要 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 计划开始日期2024-09-15 修改为2024-09-16 7个月前
openeuler-ci-bot 计划截止日期2024-10-15 修改为2024-10-16 7个月前
openeuler-ci-bot 负责人设置为luhuaxin 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 修改了描述 7个月前
openeuler-ci-bot 任务状态已完成 修改为待办的 7个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 移除了
 
sig/sig-nodejs
标签
7个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 添加了
 
sig/sig-nodejs
标签
7个月前
openeuler-ci-bot 任务状态已完成 修改为待办的 7个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 移除了
 
sig/sig-nodejs
标签
7个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 添加了
 
sig/sig-nodejs
标签
7个月前
openeuler-ci-bot 任务状态已完成 修改为待办的 7个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 移除了
 
sig/sig-nodejs
标签
7个月前
openeuler-ci-bot 添加了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 添加了
 
sig/sig-nodejs
标签
7个月前

该漏洞影响的是node-undici,上游社区在5.28.4版本修复,见:https://github.com/nodejs/undici/releases/tag/v5.28.4

当前nodejs维护版本为20.11.1、12.22.11版本。在20.11.1版本源码中打包的undici版本为5.28.3,升级到20.12.1版本后打包的undici版本为5.28.4,需升级修复此漏洞

12.22.11版本源码中未打包undici模块相关的代码,故不涉及。

影响性分析说明:
Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for fetch(), but did not clear them for undici.request(). This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

openEuler评分:
3.9
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

受影响版本排查(受影响/不受影响):
1.master(20.11.1): 受影响
2.openEuler-20.03-LTS-SP4(12.22.11): 不受影响
3.openEuler-22.03-LTS-SP1(12.22.11): 不受影响
4.openEuler-22.03-LTS-SP3(12.22.11): 不受影响
5.openEuler-22.03-LTS-SP4(12.22.11): 不受影响
6.openEuler-24.03-LTS(20.11.1): 受影响
7.openEuler-24.03-LTS-Next(20.11.1): 受影响

修复是否涉及abi变化(是/否):
1.master(20.11.1): 是
2.openEuler-20.03-LTS-SP4(12.22.11): 否
3.openEuler-22.03-LTS-SP1(12.22.11): 否
4.openEuler-22.03-LTS-SP3(12.22.11): 否
5.openEuler-22.03-LTS-SP4(12.22.11): 否
6.openEuler-24.03-LTS(20.11.1): 是
7.openEuler-24.03-LTS-Next(20.11.1): 是

openeuler-ci-bot 修改了描述 7个月前
starlet_dx 任务状态待办的 修改为已完成 7个月前
openeuler-ci-bot 移除了
 
CVE/UNFIXED
标签
7个月前
openeuler-ci-bot 移除了
 
sig/sig-nodejs
标签
7个月前
openeuler-ci-bot 添加了
 
CVE/FIXED
标签
7个月前
openeuler-ci-bot 添加了
 
sig/sig-nodejs
标签
7个月前
openeuler-ci-bot 添加了
 
abi-changed
标签
7个月前
openeuler-ci-bot 修改了描述 7个月前

登录 后才可以发表评论

状态
负责人
项目
里程碑
分支
开始日期   -   截止日期
-
置顶选项
优先级
预计工期 (小时)
参与者(2)
5329419 openeuler ci bot 1632792936 starlet_dx-starlet-dx
1
https://gitee.com/src-openeuler/nodejs.git
git@gitee.com:src-openeuler/nodejs.git
src-openeuler
nodejs
nodejs

搜索帮助