[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2020-15168 -- node-fetch

ID: oval:org.secpod.oval:def:2004110Date: (C)2020-10-08   (M)2021-09-11
Class: VULNERABILITYFamily: unix




node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don"t double-check the size of the data after fetch has completed, your JS thread could get tied up doing work on a large file and/or cost you money in computing.

Platform:
Debian 10.x
Product:
node-fetch
Reference:
CVE-2020-15168
CVE    1
CVE-2020-15168
CPE    2
cpe:/o:debian:debian_linux:10.x
cpe:/a:node-fetch_project:node-fetch

© SecPod Technologies