/
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-57g3-622h-7h78

Published

Last updated

https://images.chainguard.dev/security/CGA-57g3-622h-7h78
Package

kibana-8.13

Repository

Chainguard

Latest Update
Under investigation
Aliases
  • CVE-2025-22150
  • GHSA-c76h-2ccp-4975

Severity

Unknown

Summary

Use of Insufficiently Random Values in undici

Description

Impact

Undici fetch() uses Math.random() to choose the boundary for a multipart/form-data request. It is known that the output of Math.random() can be predicted if several of its generated values are known.

If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, An attacker can tamper with the requests going to the backend APIs if certain conditions are met.

Patches

This is fixed in 5.28.5; 6.21.1; 7.2.3.

Workarounds

Do not issue multipart requests to attacker controlled servers.

References

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Products

Chainguard ContainersChainguard LibrariesChainguard VMs