CVE-2026-1527 | Teknoloji dünyasından en güncel haberleri ve güvenlikle ilgili gelişmeleri takip edin.

ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to: * Inject…
Medium CVSS: 4.6

CVE-2026-1527

ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to:

* Inject arbitrary HTTP headers
* Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)
The vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters:

// lib/dispatcher/client-h1.js:1121
if (upgrade) {
header += `connection: upgrade\r\nupgrade: ${upgrade}\r\n`
}
Vendor
Nodejs
Product
Undici
CWE
CWE-93
Yayın Tarihi
2026-03-12 21:16:25
Güncelleme
2026-03-20 15:49:31
Source Identifier
ce714d77-add3-4f53-aff5-83d477b104bb
KEV Date Added
-

Kategoriler

Referanslar