Description
fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the application to crash. This issue has been addressed in commit `fbb07e8d` and will be included in release version 4.8.1. Users are advised to upgrade. Users unable to upgrade may manually filter out http content with malicious Content-Type headers.
Remediation
References
https://github.com/fastify/fastify/security/advisories/GHSA-455w-c45v-86rg
https://github.com/fastify/fastify/security/policy
https://github.com/fastify/fastify/commit/fbb07e8dfad74c69cd4cd2211aedab87194618e3
Related Vulnerabilities
CVE-2020-25640 Vulnerability in maven package org.jboss.genericjms:generic-jms-ra-jar
CVE-2020-2198 Vulnerability in maven package hudson.plugins:project-inheritance
CVE-2020-11057 Vulnerability in maven package org.xwiki.platform:xwiki-platform-dashboard-macro
CVE-2018-25007 Vulnerability in maven package com.vaadin:flow-server