CVE-2020-15168
10.09.2020, 19:15
node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after fetch() has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.Enginsight
Vendor | Product | Version |
---|---|---|
node-fetch_project | node-fetch | 𝑥 < 2.6.1 |
node-fetch_project | node-fetch | 3.0.0:beta1 |
node-fetch_project | node-fetch | 3.0.0:beta5 |
node-fetch_project | node-fetch | 3.0.0:beta6 |
node-fetch_project | node-fetch | 3.0.0:beta7 |
node-fetch_project | node-fetch | 3.0.0:beta8 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-770 - Allocation of Resources Without Limits or ThrottlingThe software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.