NodeJS/request/2.30.0


Simplified HTTP request client.

https://www.npmjs.com/package/request
Apache-2.0

3 Security Vulnerabilities

Remote Memory Exposure in request

Published date: 2018-11-09T17:44:01Z
CVE: CVE-2017-16026
Links:

Affected versions of request will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of body is number, then a buffer of that size will be allocated and sent to the remote server as the body.

Proof of Concept

var request = require('request');
var http = require('http');

var serveFunction = function (req, res){
    req.on('data', function (data) {
            console.log(data)
        });
    res.end();
};
var server = http.createServer(serveFunction);
server.listen(8000);

request({
    method: "POST",
    uri: 'http://localhost:8000',
    multipart: [{body:500}]
},function(err,res,body){});

Recommendation

Update to version 2.68.0 or later

Affected versions: ["2.2.6", "2.9.0", "2.9.1", "2.9.2", "2.9.3", "2.9.100", "2.9.151", "2.9.153", "2.9.200", "2.9.201", "2.10.0", "2.11.1", "2.11.4", "2.12.0", "2.14.0", "2.16.0", "2.16.2", "2.18.0", "2.19.0", "2.26.0", "2.28.0", "2.30.0", "2.33.0", "2.34.0", "2.36.0", "2.37.0", "2.39.0", "2.43.0", "2.44.0", "2.45.0", "2.46.0", "2.2.9", "2.9.150", "2.9.152", "2.9.202", "2.9.203", "2.11.0", "2.11.2", "2.11.3", "2.16.4", "2.16.6", "2.20.0", "2.21.0", "2.22.0", "2.23.0", "2.24.0", "2.25.0", "2.27.0", "2.29.0", "2.31.0", "2.32.0", "2.35.0", "2.38.0", "2.40.0", "2.41.0", "2.42.0", "2.49.0", "2.50.0", "2.51.0", "2.52.0", "2.55.0", "2.56.0", "2.57.0", "2.65.0", "2.66.0", "2.53.0", "2.54.0", "2.58.0", "2.59.0", "2.60.0", "2.61.0", "2.62.0", "2.63.0", "2.64.0", "2.67.0"]
Secure versions: []

Server-Side Request Forgery in Request

Published date: 2023-03-16T15:30:19Z
CVE: CVE-2023-28155
Links:

The request package through 2.88.2 for Node.js and the @cypress/request package prior to 3.0.0 allow a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP).

NOTE: The request package is no longer supported by the maintainer.

Affected versions: ["0.10.0", "0.9.1", "1.0.0", "1.1.0", "1.1.1", "1.2.0", "1.9.0", "1.9.1", "1.9.2", "1.9.5", "1.9.7", "2.0.0", "2.0.4", "2.0.5", "2.2.0", "2.2.6", "2.9.0", "2.9.1", "2.9.2", "2.9.3", "2.9.100", "2.9.151", "2.9.153", "2.9.200", "2.9.201", "2.10.0", "2.11.1", "2.11.4", "2.12.0", "2.14.0", "2.16.0", "2.16.2", "2.18.0", "2.19.0", "2.26.0", "2.28.0", "2.30.0", "2.33.0", "2.34.0", "2.36.0", "2.37.0", "2.39.0", "2.43.0", "2.44.0", "2.45.0", "2.46.0", "2.47.0", "2.49.0", "2.50.0", "2.51.0", "2.52.0", "2.55.0", "2.56.0", "2.57.0", "2.65.0", "2.66.0", "2.68.0", "2.69.0", "2.71.0", "2.74.0", "2.78.0", "2.80.0", "2.81.0", "2.82.0", "2.83.0", "2.84.0", "2.85.0", "2.86.0", "2.87.0", "2.88.0", "0.8.3", "0.9.0", "0.9.5", "1.9.3", "1.9.8", "1.9.9", "2.0.1", "2.0.2", "2.0.3", "2.1.0", "2.1.1", "2.2.5", "2.2.9", "2.9.150", "2.9.152", "2.9.202", "2.9.203", "2.11.0", "2.11.2", "2.11.3", "2.16.4", "2.16.6", "2.20.0", "2.21.0", "2.22.0", "2.23.0", "2.24.0", "2.25.0", "2.27.0", "2.29.0", "2.31.0", "2.32.0", "2.35.0", "2.38.0", "2.40.0", "2.41.0", "2.42.0", "2.48.0", "2.53.0", "2.54.0", "2.58.0", "2.59.0", "2.60.0", "2.61.0", "2.62.0", "2.63.0", "2.64.0", "2.67.0", "2.70.0", "2.72.0", "2.73.0", "2.75.0", "2.76.0", "2.77.0", "2.79.0", "2.88.2"]
Secure versions: []

Remote Memory Exposure

Published date: 2017-04-14
CVSS Score: 5.3
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Coordinating vendor: ^Lift Security
Links:

Request is an http client.

If a request is made using multipart, and the body type is a number, then the specified number of non-zero memory is passed in the body.

Example to reproduce: ``` var request = require('request'); var http = require('http');

var serveFunction = function (req, res){ req.on('data', function (data) { console.log(data) }); res.end(); }; var server = http.createServer(serveFunction); server.listen(8000);

request({ method: POST, uri: 'http://localhost:8000', multipart: [{body:500}] },function(err,res,body){}); ```

Affected versions: ["2.2.6", "2.2.9", "2.9.0", "2.9.1", "2.9.2", "2.9.3", "2.9.100", "2.9.150", "2.9.151", "2.9.152", "2.9.153", "2.9.200", "2.9.201", "2.9.202", "2.9.203", "2.10.0", "2.11.0", "2.11.1", "2.11.2", "2.11.3", "2.11.4", "2.12.0", "2.14.0", "2.16.0", "2.16.2", "2.16.4", "2.16.6", "2.18.0", "2.19.0", "2.20.0", "2.21.0", "2.22.0", "2.23.0", "2.24.0", "2.25.0", "2.26.0", "2.27.0", "2.28.0", "2.29.0", "2.30.0", "2.31.0", "2.32.0", "2.33.0", "2.34.0", "2.35.0", "2.36.0", "2.37.0", "2.38.0", "2.39.0", "2.40.0", "2.41.0", "2.42.0", "2.43.0", "2.44.0", "2.45.0", "2.46.0", "2.52.0", "2.53.0", "2.54.0", "2.55.0", "2.56.0", "2.57.0", "2.58.0", "2.59.0", "2.60.0", "2.61.0", "2.62.0", "2.63.0", "2.64.0", "2.65.0", "2.66.0", "2.67.0", "0.10.0", "0.8.3", "0.9.0", "0.9.1", "0.9.5", "1.0.0", "1.1.0", "1.1.1", "1.2.0", "1.9.0", "1.9.1", "1.9.2", "1.9.3", "1.9.5", "1.9.7", "1.9.8", "1.9.9", "2.0.0", "2.0.1", "2.0.2", "2.0.3", "2.0.4", "2.0.5", "2.1.0", "2.1.1", "2.2.0", "2.2.5", "NodeJS/request/2.2.6", "NodeJS/request/2.9.0", "NodeJS/request/2.9.1", "NodeJS/request/2.9.2", "NodeJS/request/2.9.3", "NodeJS/request/2.9.100", "NodeJS/request/2.9.151", "NodeJS/request/2.9.153", "NodeJS/request/2.9.200", "NodeJS/request/2.9.201", "NodeJS/request/2.10.0", "NodeJS/request/2.11.1", "NodeJS/request/2.11.4", "NodeJS/request/2.12.0", "NodeJS/request/2.14.0", "NodeJS/request/2.16.0", "NodeJS/request/2.16.2", "NodeJS/request/2.18.0", "NodeJS/request/2.19.0", "NodeJS/request/2.26.0", "NodeJS/request/2.28.0", "NodeJS/request/2.30.0", "NodeJS/request/2.33.0", "NodeJS/request/2.34.0", "NodeJS/request/2.36.0", "NodeJS/request/2.37.0", "NodeJS/request/2.39.0", "NodeJS/request/2.43.0", "NodeJS/request/2.44.0", "NodeJS/request/2.45.0", "NodeJS/request/2.46.0", "NodeJS/request/2.2.9", "NodeJS/request/2.9.150", "NodeJS/request/2.9.152", "NodeJS/request/2.9.202", "NodeJS/request/2.9.203", "NodeJS/request/2.11.0", "NodeJS/request/2.11.2", "NodeJS/request/2.11.3", "NodeJS/request/2.16.4", "NodeJS/request/2.16.6", "NodeJS/request/2.20.0", "NodeJS/request/2.21.0", "NodeJS/request/2.22.0", "NodeJS/request/2.23.0", "NodeJS/request/2.24.0", "NodeJS/request/2.25.0", "NodeJS/request/2.27.0", "NodeJS/request/2.29.0", "NodeJS/request/2.31.0", "NodeJS/request/2.32.0", "NodeJS/request/2.35.0", "NodeJS/request/2.38.0", "NodeJS/request/2.40.0", "NodeJS/request/2.41.0", "NodeJS/request/2.42.0", "NodeJS/request/2.52.0", "NodeJS/request/2.55.0", "NodeJS/request/2.56.0", "NodeJS/request/2.57.0", "NodeJS/request/2.65.0", "NodeJS/request/2.66.0", "NodeJS/request/2.53.0", "NodeJS/request/2.54.0", "NodeJS/request/2.58.0", "NodeJS/request/2.59.0", "NodeJS/request/2.60.0", "NodeJS/request/2.61.0", "NodeJS/request/2.62.0", "NodeJS/request/2.63.0", "NodeJS/request/2.64.0", "NodeJS/request/2.67.0"]
Secure versions: []
Recommendation: Upgrade request to version 2.68.0 or higher. Note that versions 2.47.0-2.51.0 are not vulnerable due to a node level error that occurs when a number is passed as the body.

126 Other Versions

Version License Security Released
2.88.2 Apache-2.0 1 2020-02-11 - 16:35 over 5 years
2.88.0 Apache-2.0 1 2018-08-10 - 16:26 almost 7 years
2.87.0 Apache-2.0 1 2018-05-21 - 07:35 about 7 years
2.86.0 Apache-2.0 1 2018-05-15 - 12:06 about 7 years
2.85.0 Apache-2.0 1 2018-03-12 - 10:37 over 7 years
2.84.0 Apache-2.0 1 2018-03-12 - 08:40 over 7 years
2.83.0 Apache-2.0 1 2017-09-27 - 03:00 almost 8 years
2.82.0 Apache-2.0 1 2017-09-19 - 19:39 almost 8 years
2.81.0 Apache-2.0 1 2017-03-09 - 15:56 over 8 years
2.80.0 Apache-2.0 1 2017-03-04 - 04:42 over 8 years
2.79.0 Apache-2.0 1 2016-11-18 - 17:21 over 8 years
2.78.0 Apache-2.0 1 2016-11-03 - 13:38 over 8 years
2.77.0 Apache-2.0 1 2016-11-03 - 11:17 over 8 years
2.76.0 Apache-2.0 1 2016-10-25 - 08:57 over 8 years
2.75.0 Apache-2.0 1 2016-09-17 - 22:33 almost 9 years
2.74.0 Apache-2.0 1 2016-07-22 - 23:44 almost 9 years
2.73.0 Apache-2.0 1 2016-07-09 - 07:43 about 9 years
2.72.0 Apache-2.0 1 2016-04-17 - 13:53 about 9 years
2.71.0 Apache-2.0 1 2016-04-12 - 13:09 about 9 years
2.70.0 Apache-2.0 1 2016-04-05 - 10:07 over 9 years
2.69.0 Apache-2.0 1 2016-01-27 - 19:00 over 9 years
2.68.0 Apache-2.0 1 2016-01-27 - 16:20 over 9 years
2.67.0 Apache-2.0 3 2015-11-19 - 07:45 over 9 years
2.66.0 Apache-2.0 3 2015-11-18 - 10:07 over 9 years
2.65.0 Apache-2.0 3 2015-10-11 - 18:04 over 9 years
2.64.0 Apache-2.0 3 2015-09-25 - 12:21 almost 10 years
2.63.0 Apache-2.0 3 2015-09-21 - 14:00 almost 10 years
2.62.0 Apache-2.0 3 2015-09-15 - 08:23 almost 10 years
2.61.0 Apache-2.0 3 2015-08-19 - 15:39 almost 10 years
2.60.0 Apache-2.0 3 2015-07-21 - 12:29 almost 10 years
2.59.0 Apache-2.0 3 2015-07-20 - 08:49 almost 10 years
2.58.0 Apache-2.0 3 2015-06-16 - 11:28 about 10 years
2.57.0 Apache-2.0 3 2015-05-31 - 19:04 about 10 years
2.56.0 Apache-2.0 3 2015-05-28 - 18:03 about 10 years
2.55.0 Apache-2.0 3 2015-04-05 - 04:24 over 10 years
2.54.0 Apache-2.0 3 2015-03-24 - 22:01 over 10 years
2.53.0 Apache-2.0 3 2015-02-02 - 16:09 over 10 years
2.52.0 Apache-2.0 3 2015-02-02 - 00:58 over 10 years
2.51.0 Apache-2.0 2 2014-12-10 - 15:08 over 10 years
2.50.0 Apache-2.0 2 2014-12-09 - 15:36 over 10 years
2.49.0 Apache-2.0 2 2014-11-28 - 18:12 over 10 years
2.48.0 Apache-2.0 1 2014-11-12 - 17:08 over 10 years
2.47.0 Apache-2.0 1 2014-10-26 - 23:52 over 10 years
2.46.0 Apache-2.0 3 2014-10-23 - 16:34 over 10 years
2.45.0 Apache-2.0 3 2014-10-06 - 00:06 almost 11 years
2.44.0 Apache-2.0 3 2014-09-18 - 10:53 almost 11 years
2.43.0 Apache-2.0 3 2014-09-18 - 10:51 almost 11 years
2.42.0 Apache-2.0 3 2014-09-04 - 22:24 almost 11 years
2.41.0 Apache-2.0 3 2014-09-04 - 20:36 almost 11 years
2.40.0 Apache-2.0 3 2014-08-06 - 18:29 almost 11 years