Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://hackerone.com/reports/1429694 | mitigation third party advisory exploit |
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/ | release notes vendor advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20220325-0007/ | third party advisory |
https://www.debian.org/security/2022/dsa-5170 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory |