undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate \r\n is a workaround for this issue.
{
"cwe_ids": [
"CWE-93"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31150.json",
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "< v5.7.1, >= v5.8.0"
}
],
"source": "AFFECTED_FIELD"
}
],
"cna_assigner": "GitHub_M"
}{
"source": [
"CPE_FIELD",
"REFERENCES"
],
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "5.8.0"
}
],
"cpe": "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*"
}