Vulnerability Name: | CVE-2022-43548 (CCN-241552) |
Assigned: | 2022-11-03 |
Published: | 2022-11-03 |
Updated: | 2023-04-27 |
Summary: | Node.js could allow a remote attacker to execute arbitrary commands on the system, caused by an insufficient IsAllowedHost check. By sending a specially-crafted DBS request using an invalid octal address, an attacker could exploit this vulnerability to conduct a DNS rebinding attack and execute arbitrary commands on the system. |
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): High Availibility (A): None |
|
CVSS v2 Severity: | 7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2022-43548
Source: XF Type: UNKNOWN nodejs-cve202243548-cmd-exec(241552)
Source: support@hackerone.com Type: Mailing List, Third Party Advisory support@hackerone.com
Source: CCN Type: Node.js Blog, 2022-11-01 Nov 3 2022 Security Releases
Source: support@hackerone.com Type: Patch, Vendor Advisory support@hackerone.com
Source: support@hackerone.com Type: Third Party Advisory support@hackerone.com
Source: support@hackerone.com Type: UNKNOWN support@hackerone.com
Source: CCN Type: SNYK-ORACLE8-NPM-3166244 OS Command Injection
Source: support@hackerone.com Type: Third Party Advisory support@hackerone.com
Source: CCN Type: IBM Security Bulletin 6849223 (App Connect Enterprise) IBM App Connect Enterprise and IBM Integration Bus are vulnerable to a remote attacker due to Node.js (CVE-2022-43548 & CVE-2022-35256)
Source: CCN Type: IBM Security Bulletin 6854085 (Answer Retrieval for Watson Discovery On Prem) Multiple vulnerabilities present in IBM Answer Retrieval for Watson Discovery versions 2.9 and earlier
Source: CCN Type: IBM Security Bulletin 6855129 (Watson Discovery) IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Node.js
Source: CCN Type: IBM Security Bulletin 6856441 (Cloud Transformation Advisor) IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6952403 (App Connect Enterprise Certified Container) IBM App Connect Enterprise Certified Container operands may be vulnerable to arbitrary code execution due to [CVE-2022-43548]
Source: CCN Type: IBM Security Bulletin 6952887 (Voice Gateway) Vulnerability in Node.js affects IBM Voice Gateway
Source: CCN Type: IBM Security Bulletin 6953123 (Watson Assistant for Cloud Pak for Data) IBM Watson Assistant for IBM Cloud Pak for Data is vulnerable to Node.js command execution vulnerability (CVE-2022-43548)
Source: CCN Type: IBM Security Bulletin 6957836 (Planning Analytics Workspace) IBM Planning Analytics Workspace is affected by vulnerabilties (CVE-2022-43548, CVE-2020-7676, CVE-2021-42550, CVE-2021-38561, CVE-2022-32149)
Source: CCN Type: IBM Security Bulletin 6959033 (Business Automation Workflow traditional) Multiple vulnerabilities in IBM SDK for Node.js and packaged modules affect IBM Business Automation Workflow Configuration Editor
Source: CCN Type: IBM Security Bulletin 6959927 (Cloud Integration Platform) Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to CVE-2022-43548 in Node.js
Source: CCN Type: IBM Security Bulletin 6965816 (Spectrum Protect Plus) Vulnerabilities in Node.js, libcurl, Golang Go, Jetty, Guava, Netty, OpenSSL, Linux kernel may affect IBM Spectrum Protect Plus
Source: CCN Type: IBM Security Bulletin 6982841 (Netcool Operations Insight) Netcool Operations Insight v1.6.8 addresses multiple security vulnerabilities.
Source: CCN Type: IBM Security Bulletin 6984185 (Db2 Graph) IBM Db2 Graph is vulnerable to remote execution of arbitrary commands due to Node.js CVE-2022-43548
Source: CCN Type: IBM Security Bulletin 6986505 (Cognos Analytics) IBM Cognos Analytics has addressed multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 7008449 (Db2 on Cloud Pak for Data) Multiple vulnerabilities affect IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data
Source: CCN Type: Mend Vulnerability Database CVE-2022-43548
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*Configuration RedHat 3: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*Configuration RedHat 4: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:nodejs:node.js:14.0:*:*:*:*:*:*:*AND cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:planning_analytics_local:*:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect:11.0.0.0:*:*:*:enterprise:*:*:*OR cpe:/a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_analytics:11.1:*:*:*:*:*:*:*OR cpe:/a:ibm:voice_gateway:1.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:voice_gateway:1.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:voice_gateway:1.0.2.4:*:*:*:*:*:*:*OR cpe:/a:ibm:voice_gateway:1.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:voice_gateway:1.0.5:*:*:*:*:*:*:*OR cpe:/a:ibm:voice_gateway:1.0.6:*:*:*:*:*:*:*OR cpe:/a:ibm:voice_gateway:1.0.7:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_analytics:11.2:*:*:*:*:*:*:*OR cpe:/a:ibm:planning_analytics_workspace:2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:20.0.0.1:*:*:*:traditional:*:*:*OR cpe:/a:ibm:business_automation_workflow:20.0.0.2:*:*:*:traditional:*:*:*OR cpe:/a:ibm:business_automation_workflow:21.0.1:*:*:*:traditional:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:22.0.1:*:*:*:traditional:*:*:*OR cpe:/a:ibm:business_automation_workflow:21.0.3.1:*:*:*:traditional:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.0:*:*:*:lts:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:6.0:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:app_connect_enterprise:11.0.0.19:*:*:*:*:*:*:*OR cpe:/a:ibm:business_automation_workflow:22.0.2:*:*:*:traditional:*:*:*OR cpe:/a:ibm:app_connect_enterprise_certified_container:6.2:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.opensuse.security:def:1253 | P | Security update for nodejs18 (Moderate) | 2023-02-15 | oval:com.redhat.rhsa:def:20230321 | P | RHSA-2023:0321: nodejs and nodejs-nodemon security, bug fix, and enhancement update (Moderate) | 2023-01-23 | oval:com.redhat.rhsa:def:20230050 | P | RHSA-2023:0050: nodejs:14 security, bug fix, and enhancement update (Moderate) | 2023-01-09 | oval:com.redhat.rhsa:def:20229073 | P | RHSA-2022:9073: nodejs:16 security, bug fix, and enhancement update (Moderate) | 2022-12-15 | oval:com.redhat.rhsa:def:20228832 | P | RHSA-2022:8832: nodejs:18 security, bug fix, and enhancement update (Moderate) | 2022-12-06 | oval:com.redhat.rhsa:def:20228833 | P | RHSA-2022:8833: nodejs:18 security, bug fix, and enhancement update (Moderate) | 2022-12-06 |
|
BACK |
nodejs node.js 14.0
ibm spectrum protect plus 10.1.0
ibm planning analytics local *
ibm app connect 11.0.0.0
ibm integration bus 10.0.0.0
ibm cognos analytics 11.1
ibm voice gateway 1.0.2
ibm voice gateway 1.0.3
ibm cloud transformation advisor 2.0.1
ibm voice gateway 1.0.2.4
ibm voice gateway 1.0.4
ibm voice gateway 1.0.5
ibm voice gateway 1.0.6
ibm voice gateway 1.0.7
ibm app connect enterprise 12.0.1.0
ibm cognos analytics 11.2
ibm planning analytics workspace 2.0
ibm business automation workflow 20.0.0.1
ibm business automation workflow 20.0.0.2
ibm business automation workflow 21.0.1
ibm app connect enterprise certified container 4.1
ibm app connect enterprise certified container 4.2
ibm business automation workflow 22.0.1
ibm business automation workflow 21.0.3.1
ibm app connect enterprise certified container 5.0
ibm app connect enterprise certified container 5.1
ibm app connect enterprise certified container 5.2
ibm app connect enterprise certified container 6.0
ibm app connect enterprise certified container 6.1
ibm app connect enterprise 11.0.0.19
ibm business automation workflow 22.0.2
ibm app connect enterprise certified container 6.2