Inconsistent interpretation of HTTP requests in Node.js - CVE-2020-8201

 

Inconsistent interpretation of HTTP requests in Node.js - CVE-2020-8201

Published: September 18, 2020 / Updated: September 30, 2020


Vulnerability identifier: #VU47218
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-8201
CWE-ID: CWE-444
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Node.js
Software vendor:
Node.js Foundation

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.


Remediation

Install update from vendor's website.

External links