@fastify/reply-from JSON Content-Type parsing confusion
Moderate severity
GitHub Reviewed
Published
Jan 8, 2024
in
fastify/fastify-reply-from
•
Updated Jan 8, 2024
Description
Published by the National Vulnerability Database
Jan 8, 2024
Published to the GitHub Advisory Database
Jan 8, 2024
Reviewed
Jan 8, 2024
Last updated
Jan 8, 2024
Impact
The main repo of fastify use fast-content-type-parse to parse request Content-Type, which will trim after split.
The fastify-reply-from have not use this repo to unify the parse of Content-Type, which won't trim.
As a result, a reverse proxy server built with
@fastify/reply-from
could misinterpret the incoming body by passing an headerContentType: application/json ; charset=utf-8
. This can lead to bypass of security checks.Patches
@fastify/reply-from
v9.6.0 include the fix.Workarounds
There are no known workarounds.
References
Hackerone Report: https://hackerone.com/reports/2295770.
References