First published: Thu Jul 14 2022(Updated: )
Node.js could allow a local attacker to gain elevated privileges on the system, caused by the DLL search order hijacking of providers.dll. By placing a specially crafted file, an attacker could exploit this vulnerability to escalate privileges.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cognos Controller | <=11.0.0 - 11.0.1 | |
Node.js | >=14.0.0<=14.14.0 | |
Node.js | >=14.14.0<14.20.0 | |
Node.js | >=16.0.0<=16.12.0 | |
Node.js | >=16.13.0<16.16.0 | |
Node.js | >=18.0.0<18.0.5 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32223 is a vulnerability in Node.js that allows hijacking the execution flow through DLL hijacking on Windows platforms.
The severity of CVE-2022-32223 is high, with a CVSS score of 7.3.
CVE-2022-32223 can be exploited if the victim has specific dependencies on a Windows machine, including having OpenSSL installed and a particular file path present.
Node.js versions 14.0.0 to 14.14.0 (inclusive), versions 14.14.0 to 14.20.0 (exclusive) with LTS tag, versions 16.0.0 to 16.12.0 (inclusive), versions 16.13.0 to 16.16.0 (exclusive) with LTS tag, and versions 18.0.0 to 18.0.5 (exclusive) are affected by CVE-2022-32223.
Users should upgrade their Node.js installations to the patched versions mentioned in the security advisories.