Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-44532


Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.


Published

2022-02-24T19:15:09.360

Last Modified

2024-11-21T06:31:10.750

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-296
  • Type: Primary
    CWE-295

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application nodejs node.js < 12.22.9 Yes
Application nodejs node.js < 14.18.3 Yes
Application nodejs node.js < 16.13.2 Yes
Application nodejs node.js < 17.3.1 Yes
Application oracle graalvm 20.3.5 Yes
Application oracle graalvm 21.3.1 Yes
Application oracle graalvm 22.0.0.2 Yes
Application oracle mysql_cluster ≤ 8.0.29 Yes
Application oracle mysql_connectors ≤ 8.0.28 Yes
Application oracle mysql_enterprise_monitor ≤ 8.0.29 Yes
Application oracle mysql_server ≤ 5.7.37 Yes
Application oracle mysql_server ≤ 8.0.28 Yes
Application oracle mysql_workbench ≤ 8.0.28 Yes
Application oracle peoplesoft_enterprise_peopletools 8.58 Yes
Application oracle peoplesoft_enterprise_peopletools 8.59 Yes
Operating System debian debian_linux 11.0 Yes

References