Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-44531

Опубликовано: 10 янв. 2022
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.

A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.

Отчет

Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2]. [1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security [2] https://issues.redhat.com/browse/PROJQUAY-1409 Therefore Quay component is marked as "Will not fix" with impact LOW.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 9nodejsNot affected
Red Hat Quay 3nodejsWill not fix
Red Hat Enterprise Linux 8nodejsFixedRHEA-2022:513921.06.2022
Red Hat Enterprise Linux 8nodejsFixedRHSA-2022:783008.11.2022
Red Hat Enterprise Linux 8nodejsFixedRHSA-2022:907315.12.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsnodejsFixedRHEA-2022:492507.06.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportnodejsFixedRHEA-2022:522128.06.2022
Red Hat Enterprise Linux 8.4 Extended Update SupportnodejsFixedRHEA-2022:561519.07.2022
Red Hat Enterprise Linux 8.6 Extended Update SupportnodejsFixedRHSA-2023:174212.04.2023
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs12-nodejsFixedRHSA-2022:491406.06.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=2040839nodejs: Improper handling of URI Subject Alternative Names

EPSS

Процентиль: 29%
0.00104
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 3 лет назад

Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.

CVSS3: 7.4
nvd
больше 3 лет назад

Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.

CVSS3: 7.4
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7.4
debian
больше 3 лет назад

Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI ...

CVSS3: 7.4
github
больше 3 лет назад

Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.

EPSS

Процентиль: 29%
0.00104
Низкий

7.4 High

CVSS3