CVE-2024-30261

Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*
cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*

History

04 Nov 2025, 17:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240905-0008/ -

Information

Published : 2024-04-04 15:15

Updated : 2025-11-04 17:15


NVD link : CVE-2024-30261

Mitre link : CVE-2024-30261

CVE.ORG link : CVE-2024-30261


JSON object : View

Products Affected

fedoraproject

  • fedora

nodejs

  • undici
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo