Security Bypass in Fastify Plugin for HTTP Request Forwarding from Fastify
CVE-2023-51701

5.3MEDIUM

Key Information:

Vendor

Fastify

Vendor
CVE Published:
8 January 2024

What is CVE-2023-51701?

The Fastify plugin 'fastify-reply-from' is designed for HTTP request forwarding to other servers. However, a flaw exists wherein the plugin misinterprets the incoming request body due to improper handling of the 'ContentType: application/json; charset=utf-8' header. This exploitation can result in security checks being bypassed, raising significant concerns regarding the integrity of the requesting process. Users are urged to upgrade to version 9.6.0 or later to mitigate this issue.

Affected Version(s)

fastify-reply-from < 9.6.0

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.