Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.
The product does not terminate or incorrectly terminates a string or array with a null character or equivalent terminator.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ | patch vendor advisory |
https://hackerone.com/reports/1178337 | third party advisory issue tracking exploit |
https://www.oracle.com/security-alerts/cpuoct2021.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20210923-0001/ | third party advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20211022-0003/ | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | third party advisory patch |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory |
https://security.gentoo.org/glsa/202401-02 | vendor advisory |