Vulnerability Description
Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Request Project | Request | >= 2.2.6, < 2.47.0 |
Related Weaknesses (CWE)
References
- https://github.com/request/request/issues/1904ExploitIssue TrackingThird Party Advisory
- https://github.com/request/request/pull/2018ExploitIssue TrackingThird Party Advisory
- https://nodesecurity.io/advisories/309ExploitThird Party Advisory
- https://github.com/request/request/issues/1904ExploitIssue TrackingThird Party Advisory
- https://github.com/request/request/pull/2018ExploitIssue TrackingThird Party Advisory
- https://nodesecurity.io/advisories/309ExploitThird Party Advisory
FAQ
What is CVE-2017-16026?
CVE-2017-16026 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2...
How severe is CVE-2017-16026?
CVE-2017-16026 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16026?
Check the references section above for vendor advisories and patch information. Affected products include: Request Project Request.