Description
https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
Remediation
References
https://hackerone.com/reports/319532
Related Vulnerabilities
CVE-2022-1291 Vulnerability in npm package tableexport.jquery.plugin
CVE-2023-27563 Vulnerability in npm package n8n
CVE-2020-36649 Vulnerability in maven package org.webjars.npm:papaparse
CVE-2020-15232 Vulnerability in maven package org.mapfish.print:print-standalone
CVE-2018-18389 Vulnerability in maven package org.neo4j:neo4j-security-enterprise