CVE-2021-44532

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
VendorProductVersion
nodejsnode.js
𝑥
< 12.22.9
nodejsnode.js
14.0.0 ≤
𝑥
< 14.18.3
nodejsnode.js
16.0.0 ≤
𝑥
< 16.13.2
nodejsnode.js
17.0.0 ≤
𝑥
< 17.3.1
oraclegraalvm
20.3.5
oraclegraalvm
21.3.1
oraclegraalvm
22.0.0.2
oraclemysql_cluster
𝑥
≤ 8.0.29
oraclemysql_connectors
𝑥
≤ 8.0.28
oraclemysql_enterprise_monitor
𝑥
≤ 8.0.29
oraclemysql_server
𝑥
≤ 5.7.37
oraclemysql_server
8.0.0 ≤
𝑥
≤ 8.0.28
oraclemysql_workbench
8.0.0 ≤
𝑥
≤ 8.0.28
oraclepeoplesoft_enterprise_peopletools
8.58
oraclepeoplesoft_enterprise_peopletools
8.59
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nodejs
bullseye
12.22.12~dfsg-1~deb11u4
fixed
buster
ignored
bullseye (security)
12.22.12~dfsg-1~deb11u5
fixed
bookworm
18.19.0+dfsg-6~deb12u2
fixed
bookworm (security)
18.19.0+dfsg-6~deb12u1
fixed
sid
20.17.0+dfsg-2
fixed
trixie
20.17.0+dfsg-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nodejs
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage