vulnerability
Amazon Linux AMI 2: CVE-2020-8201: Security patch for libuv (ALAS-2021-1581)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Sep 18, 2020 | Jan 8, 2021 | Sep 30, 2022 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Sep 18, 2020
Added
Jan 8, 2021
Modified
Sep 30, 2022
Description
Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.
Solutions
amazon-linux-ami-2-upgrade-libuvamazon-linux-ami-2-upgrade-libuv-debuginfoamazon-linux-ami-2-upgrade-libuv-develamazon-linux-ami-2-upgrade-libuv-static
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.