CVE-2022-43548

EUVD-2022-46545
A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
Affected Products (NVD)
VendorProductVersion
nodejsnode.js
14.0.0 ≤
𝑥
≤ 14.14.0
nodejsnode.js
14.15.0 ≤
𝑥
< 14.21.1
nodejsnode.js
16.0.0 ≤
𝑥
≤ 16.12.0
nodejsnode.js
16.13.0 ≤
𝑥
< 16.18.1
nodejsnode.js
18.0.0 ≤
𝑥
≤ 18.11.0
nodejsnode.js
18.12.0
nodejsnode.js
19.0.0
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nodejs
bookworm
18.19.0+dfsg-6~deb12u2
fixed
bookworm (security)
18.19.0+dfsg-6~deb12u1
fixed
bullseye
12.22.12~dfsg-1~deb11u4
fixed
bullseye (security)
12.22.12~dfsg-1~deb11u5
fixed
sid
20.17.0+dfsg-2
fixed
trixie
20.17.0+dfsg-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nodejs
bionic
Fixed 8.10.0~dfsg-2ubuntu0.4+esm4
released
focal
Fixed 10.19.0~dfsg-3ubuntu1.3
released
jammy
Fixed 12.22.9~dfsg-1ubuntu3.2
released
kinetic
ignored
lunar
not-affected
mantic
not-affected
trusty
not-affected
xenial
not-affected