Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-22884

Опубликовано: 18 фев. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

A flaw was found in nodejs. A denial of service is possible when the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

Отчет

Red Hat Enterprise Linux ships with localhost and localhost6 defined in /etc/hosts, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :

Меры по смягчению последствий

Ensure that 'localhost6' is part of /etc/hosts. e.g.:

$ grep localhost6 /etc/hosts ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 9nodejsNot affected
Red Hat Quay 3quay/quay-rhel8Will not fix
Red Hat Enterprise Linux 8nodejsFixedRHSA-2021:073404.03.2021
Red Hat Enterprise Linux 8nodejsFixedRHSA-2021:073504.03.2021
Red Hat Enterprise Linux 8nodejsFixedRHSA-2021:074408.03.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportnodejsFixedRHSA-2021:073908.03.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportnodejsFixedRHSA-2021:074108.03.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportnodejsFixedRHSA-2021:073808.03.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportnodejsFixedRHSA-2021:074008.03.2021
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs10-nodejsFixedRHSA-2021:082715.03.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1932024nodejs: DNS rebinding in --inspect

EPSS

Процентиль: 72%
0.00741
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

CVSS3: 7.5
nvd
больше 4 лет назад

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

CVSS3: 7.5
debian
больше 4 лет назад

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to ...

suse-cvrf
больше 4 лет назад

Security update for nodejs8

suse-cvrf
больше 4 лет назад

Security update for nodejs8

EPSS

Процентиль: 72%
0.00741
Низкий

7.5 High

CVSS3