Vulnerability Name: | CVE-2022-24999 (CCN-240815) |
Assigned: | 2022-10-13 |
Published: | 2022-10-13 |
Updated: | 2023-02-16 |
Summary: | qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable). |
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Type: | CWE-1321
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2022-24999
Source: XF Type: UNKNOWN express-cve202224999-dos(240815)
Source: CCN Type: Express GIT Repository 4.17.3
Source: cve@mitre.org Type: Release Notes cve@mitre.org
Source: cve@mitre.org Type: Issue Tracking, Patch cve@mitre.org
Source: CCN Type: GITHub Web site CVE-2022-24999
Source: cve@mitre.org Type: Exploit, Third Party Advisory cve@mitre.org
Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org
Source: CCN Type: IBM Security Bulletin 6848023 (Planning Analytics Workspace) IBM Planning Analytics Workspace is affected by vulnerabilties
Source: CCN Type: IBM Security Bulletin 6856441 (Cloud Transformation Advisor) IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6953625 (Watson Assistant for Cloud Pak for Data) IBM Watson Assistant for IBM Cloud Pak for Data is vulnerable to Express.js Express denial of service (CVE-2022-24999)
Source: CCN Type: IBM Security Bulletin 6956311 (Cloud Pak for Multicloud Management) Multiple Vulnerabilities in Multicloud Management Security Services
Source: CCN Type: IBM Security Bulletin 6959033 (Business Automation Workflow traditional) Multiple vulnerabilities in IBM SDK for Node.js and packaged modules affect IBM Business Automation Workflow Configuration Editor
Source: CCN Type: IBM Security Bulletin 6964166 (App Connect Enterprise) IBM App Connect Enterprise & IBM Integration Bus are vulnerable to a denial of service due to node.js module qs [CVE-2022-24999]
Source: CCN Type: IBM Security Bulletin 6966420 (Engineering Workflow Management) IBM Engineering Workflow Management (EWM) vulnerability CVE-2022-24999
Source: CCN Type: IBM Security Bulletin 6966870 (Event Streams) IBM Event Streams is affected by a vulnerability in Express.js Express (CVE-2022-24999)
Source: CCN Type: IBM Security Bulletin 6967283 (QRadar User Behavior Analytics) IBM QRadar User Behavior Analytics is vulnerable to components with known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6967877 (Cloud Pak for Business Automation) Security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for March 2023
Source: CCN Type: IBM Security Bulletin 6986329 (Cloud Pak for Watson AIOps) Multiple Vulnerabilities in CloudPak for Watson AIOPs
Source: CCN Type: IBM Security Bulletin 6997107 (Engineering Requirements Quality Assistant) There are multiple vulnerabilites that affect IBM Engineering Requirements Quality Assistant On-Premises
Source: CCN Type: IBM Security Bulletin 6999327 (Qradar Advisor) IBM QRadar Advisor With Watson App for IBM QRadar SIEM is vulnerable to using components with known vulnerabilities
Source: CCN Type: IBM Security Bulletin 7005455 (Spectrum Discover) IBM Spectrum Discover is vulnerable to multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 7012621 (Cognos Analytics) IBM Cognos Analytics has addressed multiple vulnerabilities (CVE-2023-28530, XFID: 212233, CVE-2022-24999, CVE-2023-28530, CVE-2023-25929)
Source: CCN Type: Mend Vulnerability Database CVE-2022-24999
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:*OR cpe:/a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect:11.0.0.1:*:*:*:enterprise:*:*:*OR cpe:/a:ibm:cognos_analytics:11.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_analytics:11.2:*:*:*:*:*:*:*OR cpe:/a:ibm:qradar_user_behavior_analytics:1.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:planning_analytics_workspace:2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:20.0.0.1:*:*:*:traditional:*:*:*OR cpe:/a:ibm:business_automation_workflow:20.0.0.2:*:*:*:traditional:*:*:*OR cpe:/a:ibm:business_automation_workflow:21.0.1:*:*:*:traditional:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:19.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:20.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:21.0.2:-:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise:12.0.4.0:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:22.0.1:*:*:*:traditional:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:21.0.3.1:*:*:*:traditional:*:*:*OR cpe:/a:ibm:business_automation_workflow:22.0.2:*:*:*:traditional:*:*:*OR cpe:/a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
nodejs node.js *
ibm integration bus 10.0.0.0
ibm app connect 11.0.0.1
ibm cognos analytics 11.1
ibm cloud transformation advisor 2.0.1
ibm event streams 10.0.0
ibm event streams 10.1.0
ibm engineering workflow management 7.0.1
ibm engineering workflow management 7.0.2
ibm app connect enterprise 12.0.1.0
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm cognos analytics 11.2
ibm qradar user behavior analytics 1.0.0
ibm planning analytics workspace 2.0
ibm business automation workflow 20.0.0.1
ibm business automation workflow 20.0.0.2
ibm business automation workflow 21.0.1
ibm cloud pak for business automation 18.0.0
ibm cloud pak for business automation 18.0.2
ibm cloud pak for business automation 19.0.1
ibm cloud pak for business automation 19.0.3
ibm cloud pak for business automation 20.0.1
ibm cloud pak for business automation 20.0.3
ibm cloud pak for business automation 21.0.1 -
ibm cloud pak for business automation 21.0.2 -
ibm cloud pak for business automation 21.0.3 -
ibm app connect enterprise 12.0.4.0
ibm business automation workflow 22.0.1
ibm cloud pak for business automation 22.0.1 -
ibm business automation workflow 21.0.3.1
ibm business automation workflow 22.0.2
ibm cloud pak for business automation 22.0.2 -