vulnerabilités nodejs LTS – HTTP Request Smuggling due to CR-to-Hyphen conversion
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2020-028 | CVE-2020-8201 | 09/18/2020 | medium | v3 |
Vulnerability details
Vulnerability in nodeJS that could allow HTTP request smuggling due to carriage return conversion to hyphen
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | medium | SMC is Impacted |
Revisions
Version | Date | Description |
---|---|---|
v1 | 12/10/2020 | Initial release |
v2 | 29/10/2020 | Modification of the target distribution |
v3 | 10/11/2020 | Modification of impacted products |
Stormshield Network Security |
CVSS v2 Overall Score: 6.1 |
Analysis |
Impacted version |
Vulnerability in nodeJS that could allow HTTP request smuggling due to carriage return conversion to hyphen. And could allow the attacke to gain access and privilege on the SMC. |
|
Workaround solution |
Solution |
There is no workaround solution. |
The 2.7.2 update will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Adjacent Network | Low | None | Complete | Complete | Complete |
CVSS Base score: 8.3 | CVSS Vector: (AV:A/AC:L/Au:N/C:C/I:C/A:C) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 6.2 | CVSS Vector: (AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
High | Medium [26-75%] |
CVSS Environmental score: 6.1 | CVSS Vector: (AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C/CDP:H/TD:M/CR:ND/IR:ND/AR:ND) |