Headline
GHSA-mg2h-6x62-wpwc: Fastify vulnerable to invalid content-type parsing, which could lead to validation bypass
Impact
In applications that specify different validation strategies for different content types, it’s possible to bypass the validation by providing a slightly altered content type such as with different casing or altered whitespacing before ;
.
Users using the the following pattern are affected:
fastify.post('/', {
handler(request, reply) {
reply.code(200).send(request.body)
},
schema: {
body: {
content: {
'application/json': {
schema: {
type: 'object',
properties: {
'foo': {
type: 'string',
}
},
required: ['foo']
}
},
}
}
}
})
User using the following pattern are not affected:
fastify.post('/', {
handler(request, reply) {
reply.code(200).send(request.body)
},
schema: {
body: {
type: 'object',
properties: {
'foo': {
type: 'string',
}
},
required: ['foo']
}
}
})
Patches
Has the problem been patched? What versions should users upgrade to?
Workarounds
Do not specify individual content types in the schema.
References
Are there any links users can visit to find out more?
https://hackerone.com/reports/3087928
Impact
In applications that specify different validation strategies for different content types, it’s possible to bypass the validation by providing a slightly altered content type such as with different casing or altered whitespacing before ;.
Users using the the following pattern are affected:
fastify.post('/’, { handler(request, reply) { reply.code(200).send(request.body) }, schema: { body: { content: { 'application/json’: { schema: { type: 'object’, properties: { 'foo’: { type: 'string’, } }, required: [‘foo’] } }, } } } })
User using the following pattern are not affected:
fastify.post('/’, { handler(request, reply) { reply.code(200).send(request.body) }, schema: { body: { type: 'object’, properties: { 'foo’: { type: 'string’, } }, required: [‘foo’] } } })
Patches
Has the problem been patched? What versions should users upgrade to?
Workarounds
Do not specify individual content types in the schema.
References
Are there any links users can visit to find out more?
https://hackerone.com/reports/3087928
References
- GHSA-mg2h-6x62-wpwc
- fastify/fastify@436da4c