Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security patch: Update undici package to 5.25.5 #1942

Merged
merged 1 commit into from
Jan 28, 2025
Merged

Conversation

e-hosseini
Copy link
Contributor

@e-hosseini e-hosseini commented Jan 24, 2025

Impact
Undici fetch() uses Math.random() to choose the boundary for a multipart/form-data request. It is known that the output of Math.random() can be predicted if several of its generated values are known.

If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, An attacker can tamper with the requests going to the backend APIs if certain conditions are met.

References
https://hackerone.com/reports/2913312
https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f
https://hackerone.com/reports/2913312
https://blog.securityevaluators.com/hacking-the-javascript-lottery-80cc437e3b7f

@e-hosseini e-hosseini requested a review from a team as a code owner January 24, 2025 09:00
Copy link
Collaborator

@thboop thboop left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM thanks for the contribution!

@thboop thboop merged commit 340a6b1 into actions:main Jan 28, 2025
16 of 17 checks passed
@kachick
Copy link

kachick commented Feb 4, 2025

@thboop Could you please share the release schedule that includes this PR to resolve #1939?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants