CVE-2022-21824
24.02.2022, 19:15
Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.
Vendor | Product | Version |
---|---|---|
nodejs | node.js | 12.0.0 ≤ 𝑥 < 12.22.9 |
nodejs | node.js | 14.0.0 ≤ 𝑥 < 14.18.3 |
nodejs | node.js | 16.0.0 ≤ 𝑥 < 16.13.2 |
nodejs | node.js | 17.0.0 ≤ 𝑥 < 17.3.1 |
oracle | mysql_cluster | 𝑥 ≤ 8.0.29 |
oracle | mysql_connectors | 𝑥 ≤ 8.0.28 |
oracle | mysql_enterprise_monitor | 𝑥 ≤ 8.0.29 |
oracle | mysql_server | 𝑥 ≤ 8.0.29 |
oracle | mysql_workbench | 𝑥 ≤ 8.0.28 |
oracle | peoplesoft_enterprise_peopletools | 8.58 |
oracle | peoplesoft_enterprise_peopletools | 8.59 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
netapp | oncommand_insight | - |
netapp | oncommand_workflow_automation | - |
netapp | snapcenter | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-471 - Modification of Assumed-Immutable Data (MAID)The software does not properly protect an assumed-immutable element from being modified by an attacker.
- CWE-1321 - Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
References