First published: Mon Jan 10 2022(Updated: )
Node.js could allow a remote attacker to bypass security restrictions, caused by the improper handling of URI Subject Alternative Name (SAN) types. An attacker could exploit this vulnerability to bypass name-constrained intermediates.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-nodejs12-nodejs | <0:12.22.12-2.el7 | 0:12.22.12-2.el7 |
redhat/rh-nodejs14-nodejs | <0:14.20.1-2.el7 | 0:14.20.1-2.el7 |
debian/nodejs | <=10.24.0~dfsg-1~deb10u1<=10.24.0~dfsg-1~deb10u3 | 12.22.12~dfsg-1~deb11u4 18.13.0+dfsg1-1 |
redhat/node | <12.22.9 | 12.22.9 |
redhat/node | <14.18.3 | 14.18.3 |
redhat/node | <16.13.2 | 16.13.2 |
redhat/node | <17.3.1 | 17.3.1 |
Nodejs Node.js | <12.22.9 | |
Nodejs Node.js | >=14.0.0<14.18.3 | |
Nodejs Node.js | >=16.0.0<16.13.2 | |
Nodejs Node.js | >=17.0.0<17.3.1 | |
Oracle GraalVM | =20.3.5 | |
Oracle GraalVM | =21.3.1 | |
Oracle GraalVM | =22.0.0.2 | |
Oracle Mysql Connectors | <=8.0.28 | |
Oracle Mysql Enterprise Monitor | <=8.0.29 | |
Oracle Mysql Server | <=5.7.37 | |
Oracle Mysql Server | >=8.0.0<=8.0.28 | |
Oracle Mysql Workbench | <=8.0.28 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.59 | |
Oracle MySQL Cluster | <=8.0.29 | |
IBM Engineering Requirements Quality Assistant On-Premises | <=All |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-44531 is a vulnerability in Node.js that could allow a remote attacker to bypass security restrictions.
CVE-2021-44531 impacts Node.js versions < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 by accepting arbitrary Subject Alternative Name (SAN) types, potentially bypassing name-constrained intermediates.
The severity of CVE-2021-44531 is high, with a severity value of 7.4.
To fix CVE-2021-44531 in Node.js, you should update to version 12.22.9 or later, 14.18.3 or later, 16.13.2 or later, or 17.3.1 or later.
You can find more information about CVE-2021-44531 at the following references: [link1], [link2], [link3].