Vulnerability Name:

CVE-2022-21824 (CCN-216933)

Assigned:2021-12-10
Published:2022-01-10
Updated:2022-11-10
Summary:Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.
CVSS v3 Severity:8.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)
7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
8.2 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)
7.1 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): High
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-1321
CWE-915
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2022-21824

Source: XF
Type: UNKNOWN
nodejs-cve202221824-weak-sec(216933)

Source: MISC
Type: Issue Tracking, Mitigation, Third Party Advisory
https://hackerone.com/reports/1431042

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20221005 [SECURITY] [DLA 3137-1] nodejs security update

Source: CCN
Type: Node.js Blog, 2022-01-11
January 10th 2022 Security Releases

Source: MISC
Type: Release Notes, Vendor Advisory
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20220325-0007/

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20220729-0004/

Source: DEBIAN
Type: Third Party Advisory
DSA-5170

Source: CCN
Type: IBM Security Bulletin 6552188 (Spectrum Protect Plus)
Vulnerabilities in PostgreSQL, Node.js, and Data Tables from Spry Media may affect IBM Spectrum Protect Plus

Source: CCN
Type: IBM Security Bulletin 6564317 (Engineering Requirements Quality Assistant)
There are multiple vulnerabilites that affect IBM Engineering Requirements Quality Assistant On-Premises (CVE-2021-4104, CVE-2021-29469, CVE-2021-44531, CVE-2021-44531, CVE-2022-21824, CVE-2021-29899, CVE-2021-27290 )

Source: CCN
Type: IBM Security Bulletin 6570281 (Security Verify Governance)
IBM has announced a release for IBM Security Verify Governance in response to a security vulnerability (CVE-2022-21824)

Source: CCN
Type: IBM Security Bulletin 6570631 (Cloud Pak for Integration)
Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to multiple CVEs in Node.js

Source: CCN
Type: IBM Security Bulletin 6574059 (App Connect Enterprise)
Vulnerabilities in Node.js affect IBM App Connect Enterprise (CVE-2022-21824)

Source: CCN
Type: IBM Security Bulletin 6574519 (Cloud Private)
Security Vulnerabilities affect IBM Cloud Private - Node.js (CVE-2021-44532, CVE-2021-44533, CVE-2022-21824)

Source: CCN
Type: IBM Security Bulletin 6582695 (Cloud Transformation Advisor)
IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6584089 (Business Automation Workflow)
Security vulnerabilities in IBM SDK for Node.js might affect the configuration editor used by IBM Business Automation Workflow and IBM Business Process Manager (BPM)

Source: CCN
Type: IBM Security Bulletin 6584189 (Watson Assistant for Cloud Pak for Data)
IBM Watson Assistant for IBM Cloud Pak for Data is vulnerable to string injection vulnerability due to Node.js (CVE-2021-44532, CVE-2021-44532 )

Source: CCN
Type: IBM Security Bulletin 6584209 (Watson Discovery)
IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in Node.js

Source: CCN
Type: IBM Security Bulletin 6591203 (Netcool Agile Service Manager)
Multiple Vulnerabilities in Node.js affects IBM Netcool Agile Service Manager

Source: CCN
Type: IBM Security Bulletin 6603013 (Event Streams)
Vulnerabilities in the Open Source Node.js runtime affect IBM Event Streams (CVE-2021-44533, CVE-2022-21824, CVE-2021-44531, CVE-2021-44532)

Source: CCN
Type: IBM Security Bulletin 6615285 (Cognos Analytics)
IBM Cognos Analytics has addressed multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6831301 (Cloud Pak for Watson AIOps)
A security vulnerability in Node.js affects IBM Cloud Pak for Watson AIOps Infrastructure Automation

Source: CCN
Type: IBM Security Bulletin 6831849 (Cloud Pak for Watson AIOps)
Multiple Vulnerabilities in CloudPak for Watson AIOPs

Source: CCN
Type: IBM Security Bulletin 6837237 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container operands may be vulnerable to prototype polution due to CVE-2022-21824

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html

Source: CCN
Type: Oracle CPUJul2022
Oracle Critical Patch Update Advisory - July 2022

Source: N/A
Type: Third Party Advisory
N/A

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2022-21824

Vulnerable Configuration:Configuration 1:
  • cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:* (Version >= 17.0.0 and < 17.3.1)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 12.0.0 and < 12.22.9)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 14.0.0 and < 14.18.3)
  • OR cpe:/a:nodejs:node.js:*:*:*:*:lts:*:*:* (Version >= 16.0.0 and < 16.13.2)

  • Configuration 2:
  • cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* (Version <= 8.0.29)
  • OR cpe:/a:oracle:mysql_server:*:*:*:*:*:*:*:* (Version <= 8.0.29)
  • OR cpe:/a:oracle:mysql_connectors:*:*:*:*:*:*:*:* (Version <= 8.0.28)
  • OR cpe:/a:oracle:mysql_workbench:*:*:*:*:*:*:*:* (Version <= 8.0.28)
  • OR cpe:/a:oracle:mysql_cluster:*:*:*:*:*:*:*:* (Version <= 8.0.29)

  • Configuration 3:
  • cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:netapp:snapcenter:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_insight:-:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:nodejs:node.js:12:*:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:14.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:business_process_manager:8.6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect:11.0.0.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:21.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect_plus:10.1.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:8192
    P
    Security update for terraform-provider-null (Important) (in QA)
    2023-06-20
    oval:org.opensuse.security:def:8191
    P
    Security update for terraform-provider-helm (Important) (in QA)
    2023-06-20
    oval:com.redhat.rhsa:def:20229073
    P
    RHSA-2022:9073: nodejs:16 security, bug fix, and enhancement update (Moderate)
    2022-12-15
    oval:com.redhat.rhsa:def:20227830
    P
    RHSA-2022:7830: nodejs:14 security update (Moderate)
    2022-11-08
    oval:org.opensuse.security:def:3542
    P
    lcms2-2.7-9.7.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:95172
    P
    nodejs16-16.14.1-150400.1.26 on GA media (Moderate)
    2022-06-22
    oval:com.redhat.rhea:def:20225139
    P
    RHEA-2022:5139: nodejs:12 bug fix and enhancement update (Moderate)
    2022-06-21
    oval:org.opensuse.security:def:119395
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:118708
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:119580
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:118898
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:119205
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:484
    P
    Security update for nodejs10 (Important)
    2022-05-17
    oval:org.opensuse.security:def:1714
    P
    Security update for nodejs14 (Moderate)
    2022-01-18
    oval:org.opensuse.security:def:1715
    P
    Security update for nodejs12 (Moderate)
    2022-01-18
    oval:org.opensuse.security:def:102274
    P
    Security update for nodejs14 (Moderate)
    2022-01-18
    oval:org.opensuse.security:def:102275
    P
    Security update for nodejs12 (Moderate)
    2022-01-18
    oval:org.opensuse.security:def:112099
    P
    corepack16-16.13.2-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:112100
    P
    corepack17-17.3.1-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:111862
    P
    Security update for nodejs12 (Moderate) (in QA)
    2022-01-14
    oval:org.opensuse.security:def:69281
    P
    Security update for nodejs14 (Moderate) (in QA)
    2022-01-14
    oval:org.opensuse.security:def:20996
    P
    Security update for nodejs12 (Important) (in QA)
    2022-01-14
    oval:org.opensuse.security:def:49467
    P
    Security update for nodejs12 (Important) (in QA)
    2022-01-14
    oval:org.opensuse.security:def:111863
    P
    Security update for nodejs14 (Moderate) (in QA)
    2022-01-14
    oval:org.opensuse.security:def:20997
    P
    Security update for nodejs14 (Moderate) (in QA)
    2022-01-14
    oval:org.opensuse.security:def:49468
    P
    Security update for nodejs14 (Moderate) (in QA)
    2022-01-14
    oval:org.opensuse.security:def:69280
    P
    Security update for nodejs12 (Moderate) (in QA)
    2022-01-14
    BACK
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    nodejs node.js *
    oracle peoplesoft enterprise peopletools 8.58
    oracle peoplesoft enterprise peopletools 8.59
    oracle mysql enterprise monitor *
    oracle mysql server *
    oracle mysql connectors *
    oracle mysql workbench *
    oracle mysql cluster *
    debian debian linux 10.0
    debian debian linux 11.0
    netapp snapcenter -
    netapp oncommand workflow automation -
    netapp oncommand insight -
    nodejs node.js 12
    nodejs node.js 14.0
    ibm business process manager 8.6.0.0
    ibm business automation workflow 18.0.0.0
    ibm business automation workflow 18.0.0.1
    ibm app connect 11.0.0.0
    ibm business automation workflow 19.0.0.1
    ibm cloud transformation advisor 2.0.1
    ibm business automation workflow 19.0.0.3
    ibm business process manager 8.5.0.0
    ibm cloud private 3.2.1 cd
    ibm event streams 10.0.0
    ibm cloud private 3.2.2 cd
    ibm business automation workflow 20.0.0.1
    ibm event streams 10.1.0
    ibm business automation workflow 20.0.0.2
    ibm event streams 10.2.0
    ibm event streams 10.3.0
    ibm event streams 10.3.1
    ibm cognos analytics 11.2.0
    ibm cognos analytics 11.1.7
    ibm cognos analytics 11.2.1
    ibm business automation workflow 21.0.3
    ibm spectrum protect plus 10.1.9.2
    ibm app connect enterprise certified container 4.2