7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
By Daniel Bevenius, 2021-07-01
Updates are now available for v16.x, v14.x, and v12.x Node.js release lines for the following issues.
Node.js is vulnerable to out-of-bounds read in libuv’s uv__idna_toascii() function which is used to convert strings to ASCII. This is called by Node’s dns module’s lookup() function and can lead to information disclosures or crashes.
You can read more about it in <https://vulners.com/cve/CVE-2021-22918>
Impacts:
Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.
You can read more about it in <https://vulners.com/cve/CVE-2021-22921>
Impacts:
This is a vulnerability in the ssri npm module which may be vulnerable to denial of service attacks.
You can read more about it in <https://github.com/advisories/GHSA-vx3p-948g-6vhq>
Impacts:
This is a vulnerability in the hosted-git-info npm module which may be vulnerable to denial of service attacks.
You can read more about it in <https://nvd.nist.gov/vuln/detail/CVE-2021-23362>
Impacts:
The Node.js project will release new versions of all supported release lines on or shortly after Thursday, July 1st, 2021.
The 16.x release line of Node.js is vulnerable to two medium severity issues.
The 14.x release line of Node.js is vulnerable to two medium severity issues.
The 12.x release line of Node.js is vulnerable to one high and three medium severity issues.
Releases will be available at, or shortly after, Thursday, July 1st, 2021.
The current Node.js security policy can be found at https://github.com/nodejs/node/blob/HEAD/SECURITY.md#security. Please follow the process outlined in https://github.com/nodejs/node/blob/main/SECURITY.md if you wish to report a vulnerability in Node.js.
Subscribe to the low-volume announcement-only nodejs-sec mailing list at <https://groups.google.com/forum/#!forum/nodejs-sec> to stay up to date on security vulnerabilities and security-related releases of Node.js and the projects maintained in the nodejs GitHub organization.
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N