Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-44532

Опубликовано: 10 янв. 2022
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.

It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.

Отчет

Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2]. [1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security [2] https://issues.redhat.com/browse/PROJQUAY-1409 Therefore Quay component is marked as "Will not fix" with impact LOW.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 9nodejsNot affected
Red Hat Quay 3nodejsWill not fix
Red Hat Enterprise Linux 8nodejsFixedRHEA-2022:513921.06.2022
Red Hat Enterprise Linux 8nodejsFixedRHSA-2022:783008.11.2022
Red Hat Enterprise Linux 8nodejsFixedRHSA-2022:907315.12.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsnodejsFixedRHEA-2022:492507.06.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportnodejsFixedRHEA-2022:522128.06.2022
Red Hat Enterprise Linux 8.4 Extended Update SupportnodejsFixedRHEA-2022:561519.07.2022
Red Hat Enterprise Linux 8.6 Extended Update SupportnodejsFixedRHSA-2023:174212.04.2023
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs12-nodejsFixedRHSA-2022:491406.06.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=2040846nodejs: Certificate Verification Bypass via String Injection

EPSS

Процентиль: 28%
0.00097
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 3 лет назад

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.

CVSS3: 5.3
nvd
больше 3 лет назад

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.

CVSS3: 5.3
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 5.3
debian
больше 3 лет назад

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (S ...

CVSS3: 5.3
github
больше 3 лет назад

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.

EPSS

Процентиль: 28%
0.00097
Низкий

7.4 High

CVSS3

Уязвимость CVE-2021-44532