First published: Sat Jun 18 2022(Updated: )
A flaw was found in the `got` package for node.js. Requested URLs are not verified and allow open redirection to a local UNIX socket.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs-nodemon | <0:2.0.19-1.el9_0 | 0:2.0.19-1.el9_0 |
redhat/rh-nodejs14-nodejs-nodemon | <0:2.0.19-1.el7 | 0:2.0.19-1.el7 |
Got Project Got | <11.8.5 | |
redhat/got | <11.8.5 | 11.8.5 |
redhat/got | <12.1.0 | 12.1.0 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-33987 has been classified with a severity that indicates significant security risks associated with open redirection vulnerabilities.
To fix CVE-2022-33987, update the `got` package to version 12.1.0 or later.
CVE-2022-33987 affects the `got` package versions up to 11.8.5 and various node.js related packages.
CVE-2022-33987 is an open redirection vulnerability that could allow attackers to bypass security restrictions.
Yes, CVE-2022-33987 can potentially allow an attacker to redirect requests to unauthorized local UNIX sockets.