A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1567245 | Issue Tracking Patch Third Party Advisory |
https://www.npmjs.com/advisories/607 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1567245 | Issue Tracking Patch Third Party Advisory |
https://www.npmjs.com/advisories/607 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1567245 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.npmjs.com/advisories/607 - Third Party Advisory |
Information
Published : 2021-03-19 20:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10196
Mitre link : CVE-2019-10196
CVE.ORG link : CVE-2019-10196
JSON object : View
Products Affected
redhat
- software_collections
- enterprise_linux
http-proxy-agent_project
- http-proxy-agent
fedoraproject
- fedora
CWE
CWE-665
Improper Initialization