Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-24999

Опубликовано: 26 нояб. 2022
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[proto]=b&a[proto]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:qs_project:qs:*:*:*:*:*:node.js:*:*
Версия до 6.2.4 (исключая)
cpe:2.3:a:qs_project:qs:*:*:*:*:*:node.js:*:*
Версия от 6.3.0 (включая) до 6.3.3 (исключая)
cpe:2.3:a:qs_project:qs:*:*:*:*:*:node.js:*:*
Версия от 6.5.0 (включая) до 6.5.3 (исключая)
cpe:2.3:a:qs_project:qs:*:*:*:*:*:node.js:*:*
Версия от 6.7.0 (включая) до 6.7.3 (исключая)
cpe:2.3:a:qs_project:qs:*:*:*:*:*:node.js:*:*
Версия от 6.8.0 (включая) до 6.8.3 (исключая)
cpe:2.3:a:qs_project:qs:*:*:*:*:*:node.js:*:*
Версия от 6.9.0 (включая) до 6.9.7 (исключая)
cpe:2.3:a:qs_project:qs:*:*:*:*:*:node.js:*:*
Версия от 6.10.0 (включая) до 6.10.3 (исключая)
cpe:2.3:a:qs_project:qs:6.4.0:*:*:*:*:node.js:*:*
cpe:2.3:a:qs_project:qs:6.6.0:*:*:*:*:node.js:*:*
Конфигурация 2
cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:*
Версия до 4.17.3 (исключая)
Конфигурация 3
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

EPSS

Процентиль: 87%
0.03395
Низкий

7.5 High

CVSS3

Дефекты

CWE-1321
CWE-1321

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).

CVSS3: 7.5
redhat
больше 2 лет назад

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).

CVSS3: 7.5
debian
больше 2 лет назад

qs before 6.10.3, as used in Express before 4.17.3 and other products, ...

CVSS3: 7.5
github
больше 2 лет назад

qs vulnerable to Prototype Pollution

rocky
больше 2 лет назад

Moderate: nodejs:14 security, bug fix, and enhancement update

EPSS

Процентиль: 87%
0.03395
Низкий

7.5 High

CVSS3

Дефекты

CWE-1321
CWE-1321