First published: Tue Oct 25 2022(Updated: )
Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.
Credit: csirt@divd.nl csirt@divd.nl csirt@divd.nl
Affected Software | Affected Version | How to fix |
---|---|---|
npm/socket.io-parser | >=3.4.0<3.4.2 | 3.4.2 |
npm/socket.io-parser | <3.3.3 | 3.3.3 |
npm/socket.io-parser | >=4.0.0<4.0.5 | 4.0.5 |
npm/socket.io-parser | >=4.1.0<4.2.1 | 4.2.1 |
Socket Socket.io-parser Node.js | <4.0.5 | |
Socket Socket.io-parser Node.js | >=4.1.0<4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2421 is a vulnerability in the Socket.io js library that allows an attacker to overwrite the _placeholder object, potentially placing references to functions in the resulting query object.
The severity of CVE-2022-2421 is critical with a severity value of 9.8.
The Socket.io-parser library versions 4.0.5 and 4.1.0 to 4.2.1 running on Node.js are affected by CVE-2022-2421.
An attacker can exploit CVE-2022-2421 by leveraging the improper type validation in attachment parsing to overwrite the _placeholder object and place references to functions in the resulting query object.
Yes, it is recommended to update to a version of the Socket.io-parser library that is not affected by CVE-2022-2421.