https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
References
Link | Resource |
---|---|
https://hackerone.com/reports/319532 | Exploit Third Party Advisory |
https://hackerone.com/reports/319532 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackerone.com/reports/319532 - Exploit, Third Party Advisory |
Information
Published : 2018-06-07 02:29
Updated : 2024-11-21 04:05
NVD link : CVE-2018-3739
Mitre link : CVE-2018-3739
CVE.ORG link : CVE-2018-3739
JSON object : View
Products Affected
https-proxy-agent_project
- https-proxy-agent