Lucene search

K
cve[email protected]CVE-2022-2421
HistoryOct 26, 2022 - 10:15 a.m.

CVE-2022-2421

2022-10-2610:15:16
CWE-89
web.nvd.nist.gov
73
2
cve-2022-2421
socket.io
type validation
attachment parsing
security vulnerability

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.2%

Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.

Affected configurations

NVD
Node
socketsocket.io-parserRange<4.0.5node.js
OR
socketsocket.io-parserRange4.1.04.2.1node.js

CNA Affected

[
  {
    "product": "Socket.io-Parser",
    "vendor": "Socket.io",
    "versions": [
      {
        "lessThan": "4.2.1",
        "status": "affected",
        "version": "4.x",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.2%