CVE-2022-32212
14.07.2022, 15:15
A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.
| Vendor | Product | Version |
|---|---|---|
| nodejs | node.js | 14.0.0 ≤ 𝑥 ≤ 14.14.0 |
| nodejs | node.js | 14.15.0 ≤ 𝑥 < 14.20.1 |
| nodejs | node.js | 16.0.0 ≤ 𝑥 ≤ 16.12.0 |
| nodejs | node.js | 16.13.0 ≤ 𝑥 < 16.17.1 |
| nodejs | node.js | 18.0.0 ≤ 𝑥 < 18.5.0 |
| debian | debian_linux | 10.0 |
| debian | debian_linux | 11.0 |
| siemens | sinec_ins | 𝑥 < 1.0 |
| siemens | sinec_ins | 1.0 |
| siemens | sinec_ins | 1.0:sp1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
- CWE-284 - Improper Access ControlThe software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.