Source: node-axios Version: 1.11.0+dfsg-1 Severity: important Tags: security upstream Forwarded: https://github.com/axios/axios/pull/7011 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for node-axios. CVE-2025-58754[0]: | Axios is a promise based HTTP client for the browser and Node.js. | When Axios prior to version 1.11.0 runs on Node.js and is given a | URL with the `data:` scheme, it does not perform HTTP. Instead, its | Node http adapter decodes the entire payload into memory | (`Buffer`/`Blob`) and returns a synthetic 200 response. This path | ignores `maxContentLength` / `maxBodyLength` (which only protect | HTTP responses), so an attacker can supply a very large `data:` URI | and cause the process to allocate unbounded memory and crash (DoS), | even if the caller requested `responseType: 'stream'`. Version | 1.11.0 contains a patch for the issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-58754 https://www.cve.org/CVERecord?id=CVE-2025-58754 [1] https://github.com/axios/axios/pull/7011 [2] https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj [3] https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593 Please adjust the affected versions in the BTS as needed. Regards, Salvatore -- Pkg-javascript-devel mailing list Pkg-javascript-devel@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel