CVE-2022-32212
CVSS V2 None
CVSS V3 High 8.1
Description
A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.
Overview
- CVE ID
- CVE-2022-32212
- Assigner
- support@hackerone.com
- Vulnerability Status
- Modified
- Published Version
- 2022-07-14T15:15:08
- Last Modified Date
- 2023-02-23T20:15:12
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 1 | OR | 14.0.0 | 14.14.0 |
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* | 1 | OR | 14.15.0 | 14.20.1 |
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 1 | OR | 16.0.0 | 16.12.0 |
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* | 1 | OR | 16.13.0 | 16.17.1 |
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 1 | OR | 18.0.0 | 18.5.0 |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- HIGH
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.1
- Base Severity
- HIGH
- Exploitability Score
- 2.2
- Impact Score
- 5.9
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-32212 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-07-14 16:00:10 | Added to TrackCVE | |||
2022-12-06 14:33:31 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-01-10 13:17:18 | 2023-01-10T13:15:14 | CVE Modified Date | updated | |
2023-01-10 13:17:19 | References | updated | ||
2023-01-26 23:14:19 | 2023-01-26T21:15:38 | CVE Modified Date | updated | |
2023-01-26 23:14:20 | References | updated | ||
2023-02-09 03:16:04 | 2023-02-09T01:46:05 | CVE Modified Date | updated | |
2023-02-09 03:16:04 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-02-23 21:14:14 | 2023-02-23T20:15:12 | CVE Modified Date | updated | |
2023-02-23 21:14:14 | Analyzed | Modified | Vulnerability Status | updated |
2023-02-23 21:14:14 | Weakness Enumeration | update | ||
2023-02-23 21:14:15 | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.16.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks. | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks. | Description | updated |