CVE-2019-15606
nodejs: HTTP header values do not have trailing optional whitespace trimmed
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
Una inclusión de espacios en blanco finales en los valores de encabezado HTTP en Nodejs versiones 10, 12 y 13, causa una omisión de autorización según las comparaciones de valores de encabezado.
A flaw was found in Node.js where the HTTP(s) header values were not stripped of trailing whitespace. An attacker can use this flaw to send an HTTP(s) request which is validated by an upstream proxy server, but not by the Node.js HTTP(s) server.
Rogier Schouten discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Ethan Rubinson discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-08-26 CVE Reserved
- 2020-02-07 CVE Published
- 2025-04-30 CVE Updated
- 2025-04-30 First Exploit
- 2025-07-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-138: Improper Neutralization of Special Elements
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20200221-0004 | Third Party Advisory |
|
https://www.oracle.com//security-alerts/cpujul2021.html | Third Party Advisory |
|
https://www.oracle.com/security-alerts/cpuapr2020.html | Third Party Advisory |
|
URL | Date | SRC |
---|---|---|
https://hackerone.com/reports/730779 | 2025-04-30 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html | 2024-03-07 | |
https://access.redhat.com/errata/RHSA-2020:0573 | 2024-03-07 | |
https://access.redhat.com/errata/RHSA-2020:0579 | 2024-03-07 | |
https://access.redhat.com/errata/RHSA-2020:0597 | 2024-03-07 | |
https://access.redhat.com/errata/RHSA-2020:0598 | 2024-03-07 | |
https://access.redhat.com/errata/RHSA-2020:0602 | 2024-03-07 | |
https://nodejs.org/en/blog/release/v10.19.0 | 2024-03-07 | |
https://nodejs.org/en/blog/release/v12.15.0 | 2024-03-07 | |
https://nodejs.org/en/blog/release/v13.8.0 | 2024-03-07 | |
https://nodejs.org/en/blog/vulnerability/february-2020-security-releases | 2024-03-07 | |
https://security.gentoo.org/glsa/202003-48 | 2024-03-07 | |
https://www.debian.org/security/2020/dsa-4669 | 2024-03-07 | |
https://access.redhat.com/security/cve/CVE-2019-15606 | 2020-02-25 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1800366 | 2020-02-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 10.0.0 < 10.19.0 Search vendor "Nodejs" for product "Node.js" and version " >= 10.0.0 < 10.19.0" | lts |
Affected
| ||||||
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 12.0.0 < 12.15.0 Search vendor "Nodejs" for product "Node.js" and version " >= 12.0.0 < 12.15.0" | lts |
Affected
| ||||||
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 13.0.0 < 13.8.0 Search vendor "Nodejs" for product "Node.js" and version " >= 13.0.0 < 13.8.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Communications Cloud Native Core Network Function Cloud Native Environment Search vendor "Oracle" for product "Communications Cloud Native Core Network Function Cloud Native Environment" | 1.4.0 Search vendor "Oracle" for product "Communications Cloud Native Core Network Function Cloud Native Environment" and version "1.4.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 19.3.1 Search vendor "Oracle" for product "Graalvm" and version "19.3.1" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 20.0.0 Search vendor "Oracle" for product "Graalvm" and version "20.0.0" | enterprise |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 8.1 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
|