Vulnerability Name: | CVE-2022-33987 (CCN-229246) |
Assigned: | 2022-05-25 |
Published: | 2022-05-25 |
Updated: | 2022-06-28 |
Summary: | The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket. |
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None | 5.3 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-noinfo CWE-601
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2022-33987
Source: XF Type: UNKNOWN nodejs-cve202233987-sec-bypass(229246)
Source: MISC Type: Patch, Third Party Advisory https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0
Source: CCN Type: got GIT Repository Disable redirects to UNIX sockets #2047
Source: MISC Type: Patch, Third Party Advisory https://github.com/sindresorhus/got/pull/2047
Source: MISC Type: Patch, Third Party Advisory https://github.com/sindresorhus/got/releases/tag/v11.8.5
Source: CCN Type: SNYK-JS-GOT-2932019 Open Redirect
Source: CCN Type: IBM Security Bulletin 6603699 (Watson Discovery) IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in Node.js
Source: CCN Type: IBM Security Bulletin 6610082 (Db2 On Openshift) Multiple vulnerabilities affect IBM Db2 On Openshift, IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data
Source: CCN Type: IBM Security Bulletin 6611485 (Event Streams) Vulnerability in the Node.js got module affects IBM Event Streams (CVE-2022-33987)
Source: CCN Type: IBM Security Bulletin 6611967 (Cloud Pak for Automation) Multiple security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for July 2022
Source: CCN Type: IBM Security Bulletin 6611979 (App Connect Enterprise) IBM App Connect Enterprise and IBM Integration Bus are vulnerable to a remote authenticated attacker due to Node.js (CVE-2022-29244, CVE-2022-33987)
Source: CCN Type: IBM Security Bulletin 6619919 (Spectrum Protect Plus) Multiple vulnerabilities in Node.js may affect IBM Spectrum Protect Plus (CVE-2022-32223, CVE-2022-32215, CVE-2022-33987, CVE-2022-32213, CVE-2022-32212, CVE-2022-32222, CVE-2022-32214)
Source: CCN Type: IBM Security Bulletin 6825997 (Robotic Process Automation) IBM Robotic Process Automation is vulnerable to a remote attacker bypassing security restrictions due to node.js got module (CVE-2022-33987)
Source: CCN Type: IBM Security Bulletin 6828231 (Process Mining) Vulnerability in Node.js affects IBM Process Mining . CVE-2022-33987
Source: CCN Type: IBM Security Bulletin 6831799 (Cloud Transformation Advisor) IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6848225 (Netcool Operations Insight) Netcool Operations Insight v1.6.7 contains fixes for multiple security vulnerabilities.
Source: CCN Type: IBM Security Bulletin 6966896 (Maximo for Civil Infrastructure) There is a security vulnerability in Node.js module used by IBM Maximo for Civil Infrastructure in Maximo Application Suite (CVE-2022-33987)
Source: CCN Type: IBM Security Bulletin 6987045 (App Connect Enterprise Certified Container) IBM App Connect Enterprise Certified Container operands may be vulnerable to security restriction bypass due to [CVE-2022-33987]
Source: CCN Type: IBM Security Bulletin 6991591 (Edge Application Manager) Open Source Dependency Vulnerability
Source: CCN Type: IBM Security Bulletin 6997107 (Engineering Requirements Quality Assistant) There are multiple vulnerabilites that affect IBM Engineering Requirements Quality Assistant On-Premises
Source: CCN Type: IBM Security Bulletin 7005455 (Spectrum Discover) IBM Spectrum Discover is vulnerable to multiple vulnerabilities
|
Vulnerable Configuration: | Configuration 1: cpe:/a:got_project:got:*:*:*:*:*:node.js:*:* (Version < 11.8.5) Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration RedHat 3: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 4: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:nodejs:node.js:*:*:*:*:-:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect:11.0.0.0:*:*:*:enterprise:*:*:*OR cpe:/a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_automation:19.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_automation:20.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_automation:20.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_automation:20.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_automation:21.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_automation:21.0.2:-:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_automation:19.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:db2_warehouse:3.5:-:*:*:*:*:*:*OR cpe:/a:ibm:db2_warehouse:4.0:-:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_pak_for_automation:19.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise:12.0.4.0:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:db2_warehouse:4.5:-:*:*:*:*:*:*OR cpe:/a:ibm:robotic_process_automation:21.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.0:*:*:*:lts:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:6.0:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:6.2:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
got_project got *
nodejs node.js *
ibm spectrum protect plus 10.1.0
ibm app connect 11.0.0.0
ibm integration bus 10.0.0.0
ibm cloud transformation advisor 2.0.1
ibm cloud pak for automation 19.0.3
ibm cloud pak for automation 20.0.1
ibm event streams 10.0.0
ibm cloud pak for automation 20.0.2
ibm event streams 10.1.0
ibm cloud pak for automation 20.0.3
ibm event streams 10.2.0
ibm cloud pak for automation 21.0.1
ibm app connect enterprise 12.0.1.0
ibm cloud pak for automation 21.0.2 -
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm cloud pak for automation 19.0.1
ibm db2 warehouse 3.5 -
ibm db2 warehouse 4.0 -
ibm robotic process automation 21.0.0
ibm cloud pak for automation 19.0.2
ibm robotic process automation 21.0.1
ibm robotic process automation 21.0.2
ibm app connect enterprise 12.0.4.0
ibm app connect enterprise certified container 4.1
ibm app connect enterprise certified container 4.2
ibm robotic process automation 21.0.3
ibm db2 warehouse 4.5 -
ibm robotic process automation 21.0.4
ibm app connect enterprise certified container 5.0
ibm app connect enterprise certified container 5.1
ibm app connect enterprise certified container 5.2
ibm app connect enterprise certified container 6.0
ibm app connect enterprise certified container 6.1
ibm app connect enterprise certified container 6.2