When server level, connection level or route level CORS configurations in hapi node module before 11.1.4 are combined and when a higher level config included security restrictions (like origin), a higher level config that included security restrictions (like origin) would have those restrictions overridden by less restrictive defaults (e.g. origin defaults to all origins `*`).
References
Link | Resource |
---|---|
https://github.com/hapijs/hapi/issues/2980 | Exploit Issue Tracking Third Party Advisory |
https://nodesecurity.io/advisories/65 | Third Party Advisory |
https://github.com/hapijs/hapi/issues/2980 | Exploit Issue Tracking Third Party Advisory |
https://nodesecurity.io/advisories/65 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hapijs/hapi/issues/2980 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://nodesecurity.io/advisories/65 - Third Party Advisory |
Information
Published : 2018-05-29 20:29
Updated : 2024-11-21 02:40
NVD link : CVE-2015-9243
Mitre link : CVE-2015-9243
CVE.ORG link : CVE-2015-9243
JSON object : View
Products Affected
hapijs
- hapi