Lucene search

K
cveGitHub_MCVE-2022-24822
HistoryApr 06, 2022 - 6:15 p.m.

CVE-2022-24822

2022-04-0618:15:08
CWE-248
GitHub_M
web.nvd.nist.gov
65
podium
micro frontend
security
vulnerability
http
server takedown
cve-2022-24822

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

54.1%

Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the Trailer header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. @podium/layout, which is the main way developers/users are vulnerable to this exploit, has been patched in version 4.6.110. All earlier versions are vulnerable.@podium/proxy, which is the source of the vulnerability and is used by @podium/layout has been patched in version 4.2.74. All earlier versions are vulnerable. It is not easily possible to work around this issue without upgrading.

Affected configurations

Nvd
Vulners
Node
finnpodium_layoutRange<4.6.110node.js
OR
finnpodium_proxyRange<4.2.74node.js
VendorProductVersionCPE
finnpodium_layout*cpe:2.3:a:finn:podium_layout:*:*:*:*:*:node.js:*:*
finnpodium_proxy*cpe:2.3:a:finn:podium_proxy:*:*:*:*:*:node.js:*:*

CNA Affected

[
  {
    "product": "proxy",
    "vendor": "podium-lib",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.6.110"
      },
      {
        "status": "affected",
        "version": "< 4.2.74"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

54.1%

Related for CVE-2022-24822