CVE-2022-39288: Improper Check for Unusual or Exceptional Conditions
(updated )
fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the application to crash. This issue has been addressed in commit fbb07e8d
and will be included in release version 4.8.1. Users are advised to upgrade. Users unable to upgrade may manually filter out http content with malicious Content-Type headers.
References
- github.com/advisories/GHSA-455w-c45v-86rg
- github.com/fastify/fastify/commit/fbb07e8dfad74c69cd4cd2211aedab87194618e3
- github.com/fastify/fastify/security/advisories/GHSA-455w-c45v-86rg
- github.com/fastify/fastify/security/policy
- hackerone.com/bugs?report_id=1715536&subject=fastify
- nvd.nist.gov/vuln/detail/CVE-2022-39288
Detect and mitigate CVE-2022-39288 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →