Lucene search

K
cveHackeroneCVE-2021-44531
HistoryFeb 24, 2022 - 7:15 p.m.

CVE-2021-44531

2022-02-2419:15:09
CWE-295
hackerone
web.nvd.nist.gov
159
cve
node.js
san
bypass
security
vulnerability
nvd

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

7.5

Confidence

High

EPSS

0.002

Percentile

60.0%

Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.

Affected configurations

Nvd
Vulners
Node
nodejsnode.jsRange<12.22.9-
OR
nodejsnode.jsRange14.0.014.18.3-
OR
nodejsnode.jsRange16.0.016.13.2-
OR
nodejsnode.jsRange17.0.017.3.1-
Node
oraclegraalvmMatch20.3.5enterprise
OR
oraclegraalvmMatch21.3.1enterprise
OR
oraclegraalvmMatch22.0.0.2enterprise
OR
oraclemysql_connectorsRange8.0.28
OR
oraclemysql_enterprise_monitorRange8.0.29
OR
oraclemysql_serverRange5.7.37
OR
oraclemysql_serverRange8.0.08.0.28
OR
oraclemysql_workbenchRange8.0.28
OR
oraclepeoplesoft_enterprise_peopletoolsMatch8.58
OR
oraclepeoplesoft_enterprise_peopletoolsMatch8.59
Node
oraclemysql_clusterRange8.0.29
VendorProductVersionCPE
nodejsnode.js*cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
oraclegraalvm20.3.5cpe:2.3:a:oracle:graalvm:20.3.5:*:*:*:enterprise:*:*:*
oraclegraalvm21.3.1cpe:2.3:a:oracle:graalvm:21.3.1:*:*:*:enterprise:*:*:*
oraclegraalvm22.0.0.2cpe:2.3:a:oracle:graalvm:22.0.0.2:*:*:*:enterprise:*:*:*
oraclemysql_connectors*cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
oraclemysql_enterprise_monitor*cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
oraclemysql_server*cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
oraclemysql_workbench*cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
oraclepeoplesoft_enterprise_peopletools8.58cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
oraclepeoplesoft_enterprise_peopletools8.59cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
Rows per page:
1-10 of 111

CNA Affected

[
  {
    "product": "https://github.com/nodejs/node",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Fixed in 12.22.9, 14.18.3, 16.13.2, 17.3.1"
      }
    ]
  }
]

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

7.5

Confidence

High

EPSS

0.002

Percentile

60.0%