CVE-2022-43548

A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
hackeroneCNA
---
---
CVEADP
---
---
CISA-ADPADP
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
VendorProductVersion
nodejsnode.js
14.0.0 ≤
𝑥
≤ 14.14.0
nodejsnode.js
14.15.0 ≤
𝑥
< 14.21.1
nodejsnode.js
16.0.0 ≤
𝑥
≤ 16.12.0
nodejsnode.js
16.13.0 ≤
𝑥
< 16.18.1
nodejsnode.js
18.0.0 ≤
𝑥
≤ 18.11.0
nodejsnode.js
18.12.0
nodejsnode.js
19.0.0
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nodejs
bullseye
12.22.12~dfsg-1~deb11u4
fixed
bullseye (security)
12.22.12~dfsg-1~deb11u5
fixed
bookworm
18.19.0+dfsg-6~deb12u2
fixed
bookworm (security)
18.19.0+dfsg-6~deb12u1
fixed
sid
20.17.0+dfsg-2
fixed
trixie
20.17.0+dfsg-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nodejs
mantic
not-affected
lunar
not-affected
kinetic
ignored
jammy
Fixed 12.22.9~dfsg-1ubuntu3.2
released
focal
Fixed 10.19.0~dfsg-3ubuntu1.3
released
bionic
Fixed 8.10.0~dfsg-2ubuntu0.4+esm4
released
xenial
not-affected
trusty
not-affected