Lucene search

K
ibmIBM798879F6AAD008D9E01D338412E82FA508B4DEBE6C89AC1DDB29DDF6C8A511E2
HistoryDec 21, 2021 - 5:46 p.m.

Security Bulletin: Vulnerabilities in Node.js affecting IBM Event Streams (CVE-2021-22960 and CVE-2021-22959)

2021-12-2117:46:17
www.ibm.com
13
node.js
ibm event streams
http request smuggling
cve-2021-22960
cve-2021-22959
vulnerabilities
2019.4.5
10.5.0
10.2.1
upgrade
fix central

EPSS

0.005

Percentile

76.3%

Summary

Vulnerabilities in Node.js affecting IBM Event Streams

Vulnerability Details

CVEID:CVE-2021-22960
**DESCRIPTION:**Node.js is vulnerable to HTTP request smuggling, caused by an error when parsing the body of chunked requests. A remote attacker could send a specially-crafted request to lead to HTTP Request Smuggling (HRS). An attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/211171 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID:CVE-2021-22959
**DESCRIPTION:**Node.js is vulnerable to HTTP request smuggling, caused by an error related to a space in headers. A remote attacker could send a specially-crafted request with a space (SP) right after the header name before the colon to lead to HTTP Request Smuggling (HRS). An attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/211168 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Event Streams 2019.4.1, 2019.4.2, 2019.4.3, 2019.4.4
IBM Event Streams 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, 10.4.0

Remediation/Fixes

IBM Event Streams (Helm-based releases)

IBM Event Streams (Continuous Delivery)

IBM Event Streams (Extended Update Support)

Workarounds and Mitigations

None