Update dependency http-proxy to 1.18.1 [SECURITY] #25
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.18.0
->1.18.1
GitHub Vulnerability Alerts
GHSA-6x33-pw7p-hmpq
Versions of
http-proxy
prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers anERR_HTTP_HEADERS_SENT
unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using theproxyReq.setHeader
function.For a proxy server running on
http://localhost:3000
, the following curl request triggers the unhandled exception:curl -XPOST http://localhost:3000 -d "$(python -c 'print("x"*1025)')"
Recommendation
Upgrade to version 1.18.1 or later
Configuration
📅 Schedule: "" (UTC).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.