CVE-2022-39288

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-39288
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39288.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-39288
Aliases
Published
2022-10-10T00:00:00Z
Modified
2025-10-22T18:34:16.726565Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of service in Fastify via Content-Type header
Details

fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the application to crash. This issue has been addressed in commit fbb07e8d and will be included in release version 4.8.1. Users are advised to upgrade. Users unable to upgrade may manually filter out http content with malicious Content-Type headers.

Database specific
{
    "cwe_ids": [
        "CWE-754"
    ]
}
References

Affected packages

Git / github.com/fastify/fastify

Affected ranges

Type
GIT
Repo
https://github.com/fastify/fastify
Events

Affected versions

v4.*

v4.0.0
v4.0.1
v4.0.2
v4.0.3
v4.1.0
v4.2.0
v4.2.1
v4.3.0
v4.4.0
v4.5.0
v4.5.1
v4.5.2
v4.5.3
v4.6.0
v4.7.0
v4.8.0