Vulnerability Name:

CVE-2022-1650 (CCN-226482)

Assigned:2022-02-06
Published:2022-02-06
Updated:2023-08-02
Summary:
CVSS v3 Severity:8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)
7.3 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
9.3 Critical (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N)
8.4 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
8.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2022-1650

Source: XF
Type: UNKNOWN
eventsource-cve20221650-info-disc(226482)

Source: CCN
Type: EventSource GIT Repository
fix: strip sensitive headers on redirect to different origin

Source: security@huntr.dev
Type: Patch, Third Party Advisory
security@huntr.dev

Source: security@huntr.dev
Type: Exploit, Issue Tracking, Patch, Third Party Advisory
security@huntr.dev

Source: CCN
Type: huntr Web site
Exposure of Sensitive Information to an Unauthorized Actor in eventsource/eventsource

Source: security@huntr.dev
Type: Mailing List, Third Party Advisory
security@huntr.dev

Source: CCN
Type: SNYK-JS-EVENTSOURCE-2823375
Information Exposure

Source: CCN
Type: IBM Security Bulletin 6832944 (Business Automation Manager Open Editions)
Multiple security vulnerabilities are addressed with IBM Business Automation Manager Open Editions 8.0.1

Source: CCN
Type: IBM Security Bulletin 6991595 (Edge Application Manager)
Open Source Dependency Vulnerability

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:8::crb:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/a:redhat:enterprise_linux:9::crb:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:eventsource:eventsource:1.1.1:*:*:*:node.js:*:*:*
  • OR cpe:/a:eventsource:eventsource:2.0.1:*:*:*:node.js:*:*:*
  • OR cpe:/a:eventsource:eventsource:2.0.0:*:*:*:node.js:*:*:*
  • OR cpe:/a:eventsource:eventsource:1.1.0:*:*:*:node.js:*:*:*
  • OR cpe:/a:eventsource:eventsource:1.0.7:*:*:*:node.js:*:*:*
  • OR cpe:/a:eventsource:eventsource:1.0.6:*:*:*:node.js:*:*:*
  • OR cpe:/a:eventsource:eventsource:1.0.5:*:*:*:node.js:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20226057
    P
    RHSA-2022:6057: .NET Core 3.1 security, bug fix, and enhancement update (Moderate)
    2022-08-15
    oval:com.redhat.rhba:def:20225747
    P
    RHBA-2022:5747: .NET 6.0 bugfix update (Moderate)
    2022-07-28
    oval:com.redhat.rhba:def:20225749
    P
    RHBA-2022:5749: .NET 6.0 bugfix update (Moderate)
    2022-07-28
    BACK
    eventsource eventsource 1.1.1
    eventsource eventsource 2.0.1
    eventsource eventsource 2.0.0
    eventsource eventsource 1.1.0
    eventsource eventsource 1.0.7
    eventsource eventsource 1.0.6
    eventsource eventsource 1.0.5