Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-mg2h-6x62-wpwc: Fastify vulnerable to invalid content-type parsing, which could lead to validation bypass

Impact

In applications that specify different validation strategies for different content types, it’s possible to bypass the validation by providing a slightly altered content type such as with different casing or altered whitespacing before ;.

Users using the the following pattern are affected:

fastify.post('/', {
  handler(request, reply) {
    reply.code(200).send(request.body)
  },
  schema: {
    body: {
      content: {
        'application/json': {
          schema: {
            type: 'object',
            properties: {
              'foo': {
                type: 'string',
              }
            },
            required: ['foo']
          }
        },
      }
    }
  }
})

User using the following pattern are not affected:

fastify.post('/', {
  handler(request, reply) {
    reply.code(200).send(request.body)
  },
  schema: {
    body: {
      type: 'object',
      properties: {
        'foo': {
          type: 'string',
        }
      },
      required: ['foo']
    }
  }
})

Patches

Has the problem been patched? What versions should users upgrade to?

Workarounds

Do not specify individual content types in the schema.

References

Are there any links users can visit to find out more?

https://hackerone.com/reports/3087928

ghsa
#js

Impact

In applications that specify different validation strategies for different content types, it’s possible to bypass the validation by providing a slightly altered content type such as with different casing or altered whitespacing before ;.

Users using the the following pattern are affected:

fastify.post('/’, { handler(request, reply) { reply.code(200).send(request.body) }, schema: { body: { content: { 'application/json’: { schema: { type: 'object’, properties: { 'foo’: { type: 'string’, } }, required: [‘foo’] } }, } } } })

User using the following pattern are not affected:

fastify.post('/’, { handler(request, reply) { reply.code(200).send(request.body) }, schema: { body: { type: 'object’, properties: { 'foo’: { type: 'string’, } }, required: [‘foo’] } } })

Patches

Has the problem been patched? What versions should users upgrade to?

Workarounds

Do not specify individual content types in the schema.

References

Are there any links users can visit to find out more?

https://hackerone.com/reports/3087928

References

  • GHSA-mg2h-6x62-wpwc
  • fastify/fastify@436da4c

ghsa: Latest News

GHSA-9fwj-9mjf-rhj3: laravel-auth0 SDK Vulnerable to Brute Force Authentication Tags of CookieStore Sessions