Vulnerability Name: | CVE-2021-44533 (CCN-216932) |
Assigned: | 2021-12-02 |
Published: | 2022-01-10 |
Updated: | 2022-10-06 |
Summary: | Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable. |
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None | 7.4 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) 6.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): None |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-295
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2021-44533
Source: XF Type: UNKNOWN nodejs-cve202144533-sec-bypass(216932)
Source: MISC Type: Exploit, Mitigation, Third Party Advisory https://hackerone.com/reports/1429694
Source: CCN Type: Node.js Blog, 2022-01-11 January 10th 2022 Security Releases
Source: MISC Type: Release Notes, Vendor Advisory https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220325-0007/
Source: DEBIAN Type: Third Party Advisory DSA-5170
Source: CCN Type: IBM Security Bulletin 6552188 (Spectrum Protect Plus) Vulnerabilities in PostgreSQL, Node.js, and Data Tables from Spry Media may affect IBM Spectrum Protect Plus
Source: CCN Type: IBM Security Bulletin 6570631 (Cloud Pak for Integration) Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to multiple CVEs in Node.js
Source: CCN Type: IBM Security Bulletin 6572427 (Voice Gateway) Multiple Vulnerabilities in node.js
Source: CCN Type: IBM Security Bulletin 6574017 (App Connect Enterprise) Vulnerabilities in Node.js affect IBM App Connect Enterprise (CVE-2021-44533)
Source: CCN Type: IBM Security Bulletin 6574519 (Cloud Private) Security Vulnerabilities affect IBM Cloud Private - Node.js (CVE-2021-44532, CVE-2021-44533, CVE-2022-21824)
Source: CCN Type: IBM Security Bulletin 6575539 (InfoSphere Information Server) IBM InfoSphere Information Server is affected by multiple vulnerabilities in Node.js.
Source: CCN Type: IBM Security Bulletin 6582695 (Cloud Transformation Advisor) IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6584089 (Business Automation Workflow) Security vulnerabilities in IBM SDK for Node.js might affect the configuration editor used by IBM Business Automation Workflow and IBM Business Process Manager (BPM)
Source: CCN Type: IBM Security Bulletin 6584189 (Watson Assistant for Cloud Pak for Data) IBM Watson Assistant for IBM Cloud Pak for Data is vulnerable to string injection vulnerability due to Node.js (CVE-2021-44532, CVE-2021-44532 )
Source: CCN Type: IBM Security Bulletin 6584209 (Watson Discovery) IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in Node.js
Source: CCN Type: IBM Security Bulletin 6591203 (Netcool Agile Service Manager) Multiple Vulnerabilities in Node.js affects IBM Netcool Agile Service Manager
Source: CCN Type: IBM Security Bulletin 6602551 (Security Verify Governance) IBM Security Verify Governance is vulnerable to multiple security issues due to Node.js
Source: CCN Type: IBM Security Bulletin 6603013 (Event Streams) Vulnerabilities in the Open Source Node.js runtime affect IBM Event Streams (CVE-2021-44533, CVE-2022-21824, CVE-2021-44531, CVE-2021-44532)
Source: CCN Type: IBM Security Bulletin 6608566 (DataPower Gateway) IBM DataPower Gateway potentially affected by various vulnerabilities in Node
Source: CCN Type: IBM Security Bulletin 6615285 (Cognos Analytics) IBM Cognos Analytics has addressed multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6831299 (Cloud Pak for Watson AIOps) A security vulnerability in Node.js affects IBM Cloud Pak for Watson AIOps Infrastructure Automation
Source: CCN Type: IBM Security Bulletin 6831849 (Cloud Pak for Watson AIOps) Multiple Vulnerabilities in CloudPak for Watson AIOPs
Source: CCN Type: IBM Security Bulletin 6837239 (App Connect Enterprise Certified Container) IBM App Connect Enterprise Certified Container operands may be vulnerable to bypassing of security restrictions due to CVE-2021-44533
Source: CCN Type: Oracle CPUApr2022 Oracle Critical Patch Update Advisory - April 2022
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuapr2022.html
Source: N/A Type: Third Party Advisory N/A
Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-44533
|
Vulnerable Configuration: | Configuration 1: cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 17.0.0 and < 17.3.1)OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 16.0.0 and < 16.13.2)OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 14.0.0 and < 14.18.3)OR cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version < 12.22.9) Configuration 2: cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* (Version <= 8.0.29)OR cpe:/a:oracle:mysql_connectors:*:*:*:*:*:*:*:* (Version <= 8.0.28)OR cpe:/a:oracle:mysql_workbench:*:*:*:*:*:*:*:* (Version <= 8.0.28)OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.0.28)OR cpe:/a:oracle:graalvm:20.3.5:*:*:*:enterprise:*:*:*OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version <= 5.7.37)OR cpe:/a:oracle:graalvm:21.3.1:*:*:*:enterprise:*:*:*OR cpe:/a:oracle:graalvm:22.0.0.2:*:*:*:enterprise:*:*:*OR cpe:/a:oracle:mysql_cluster:*:*:*:*:*:*:*:* (Version < 8.0.29)OR cpe:/a:oracle:mysql_cluster:8.0.29:*:*:*:*:*:*:* Configuration 3: cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:nodejs:node.js:12:*:*:*:*:*:*:*OR cpe:/a:nodejs:node.js:14.0:*:*:*:*:*:*:*AND cpe:/a:ibm:business_process_manager:8.6.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:18.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:18.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect:11.0.0.0:*:*:*:enterprise:*:*:*OR cpe:/a:ibm:datapower_gateway:2018.4.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:19.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:19.0.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:20.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:20.0.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:datapower_gateway:10.0.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:voice_gateway:1.0.7:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:datapower_gateway:10.0.2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*OR cpe:/a:ibm:cognos_analytics:11.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:21.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.9.2:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
nodejs node.js *
nodejs node.js *
nodejs node.js *
nodejs node.js *
oracle peoplesoft enterprise peopletools 8.58
oracle peoplesoft enterprise peopletools 8.59
oracle mysql enterprise monitor *
oracle mysql connectors *
oracle mysql workbench *
oracle mysql server *
oracle graalvm 20.3.5
oracle mysql server *
oracle graalvm 21.3.1
oracle graalvm 22.0.0.2
oracle mysql cluster *
oracle mysql cluster 8.0.29
debian debian linux 11.0
nodejs node.js 12
nodejs node.js 14.0
ibm business process manager 8.6.0.0
ibm infosphere information server 11.7
ibm business automation workflow 18.0.0.0
ibm business automation workflow 18.0.0.1
ibm app connect 11.0.0.0
ibm datapower gateway 2018.4.1.0
ibm business automation workflow 19.0.0.1
ibm cloud transformation advisor 2.0.1
ibm business automation workflow 19.0.0.3
ibm business process manager 8.5.0.0
ibm cloud private 3.2.1 cd
ibm event streams 10.0.0
ibm cloud private 3.2.2 cd
ibm business automation workflow 20.0.0.1
ibm event streams 10.1.0
ibm business automation workflow 20.0.0.2
ibm datapower gateway 10.0.1.0
ibm voice gateway 1.0.7
ibm event streams 10.2.0
ibm datapower gateway 10.0.2.0
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm cognos analytics 11.2.0
ibm cognos analytics 11.1.7
ibm cognos analytics 11.2.1
ibm business automation workflow 21.0.3
ibm spectrum protect plus 10.1.9.2
ibm app connect enterprise certified container 4.2
ibm security verify governance 10.0