CVE-2022-21824
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/02/2022
Last modified:
10/11/2022
Description
Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.
Impact
Base Score 3.x
8.20
Severity 3.x
HIGH
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* | 12.0.0 (including) | 12.22.9 (excluding) |
| cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* | 14.0.0 (including) | 14.18.3 (excluding) |
| cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* | 16.0.0 (including) | 16.13.2 (excluding) |
| cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | 17.0.0 (including) | 17.3.1 (excluding) |
| cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:* | 8.0.29 (including) | |
| cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:* | 8.0.28 (including) | |
| cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* | 8.0.29 (including) | |
| cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* | 8.0.29 (including) | |
| cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:* | 8.0.28 (including) | |
| cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://hackerone.com/reports/1431042
- https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html
- https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/
- https://security.netapp.com/advisory/ntap-20220325-0007/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://www.debian.org/security/2022/dsa-5170
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html



