9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
By Michael Dawson, 2021-08-11
Updates are now available for v16.x, v14.x, and v12.x Node.js release lines for the following issues.
Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of host names returned by Domain Name Servers in the Node.js DNS library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.
You can read more about it in: <https://vulners.com/cve/CVE-2021-22931>
Impacts:
Thank you to Philipp Jeitner from Fraunhofer SIT for reporting this vulnerability.
Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. The issue is a follow on to CVE-2021-22930 as the issue was not completely resolved in the fix for CVE-2021-22930.
You can read more about it in: <https://vulners.com/cve/CVE-2021-22940>
Impacts:
Thank you to Eran Levin (exx8) for reporting the original vulnerability and those who helped identify the remaining issues.
If the Node.js https API was used incorrectly and “undefined” was in passed for the “rejectUnauthorized” parameter, no error was returned and connections to servers with an expired certificate would have been accepted.
You can read more about it in: <https://vulners.com/cve/CVE-2021-22939>
Impacts:
Thank you to Tim Perry, from HTTP Toolkit for reporting this vulnerability.
The Node.js project will release new versions of all supported release lines on or shortly after Wednesday August 11th, 2021 in order to address:
The 16.x release line of Node.js is vulnerable to two high severity issues and one low severity issue.
The 14.x release line of Node.js is vulnerable to two high severity issues and one low severity issue.
The 12.x release line of Node.js is vulnerable to two high severity issues and one low severity issue.
Releases will be available at, or shortly after, Wednesday, August 11th, 2021.
The current Node.js security policy can be found at https://github.com/nodejs/node/blob/HEAD/SECURITY.md#security. Please follow the process outlined in https://github.com/nodejs/node/blob/main/SECURITY.md if you wish to report a vulnerability in Node.js.
Subscribe to the low-volume announcement-only nodejs-sec mailing list at <https://groups.google.com/forum/#!forum/nodejs-sec> to stay up to date on security vulnerabilities and security-related releases of Node.js and the projects maintained in the nodejs GitHub organization.
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P