{"api_version":"1","generated_at":"2026-04-22T22:50:45+00:00","cve":"CVE-2022-29244","urls":{"html":"https://cve.report/CVE-2022-29244","api":"https://cve.report/api/cve/CVE-2022-29244.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-29244","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-29244"},"summary":{"title":"CVE-2022-29244","description":"npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-06-13 14:15:00","updated_at":"2022-10-27 16:25:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://github.com/nodejs/node/releases/tag/v18.3.0","name":"https://github.com/nodejs/node/releases/tag/v18.3.0","refsource":"MISC","tags":[],"title":"Release 2022-06-01, Version 18.3.0 (Current), @bengl · nodejs/node · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/nodejs/node/pull/43210","name":"https://github.com/nodejs/node/pull/43210","refsource":"MISC","tags":[],"title":"deps: upgrade npm to 8.11.0 by npm-cli-bot · Pull Request #43210 · nodejs/node · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish","name":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish","refsource":"MISC","tags":[],"title":"cli/workspaces/libnpmpublish at latest · npm/cli · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/nodejs/node/releases/tag/v17.9.1","name":"https://github.com/nodejs/node/releases/tag/v17.9.1","refsource":"MISC","tags":[],"title":"Release 2022-06-01, Version 17.9.1 (Current), @ruyadorno · nodejs/node · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52","name":"https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52","refsource":"MISC","tags":[],"title":"Packing does not respect root-level ignore files in workspaces · Advisory · npm/cli · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpack","name":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpack","refsource":"MISC","tags":[],"title":"cli/workspaces/libnpmpack at latest · npm/cli · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/npm/cli/releases/tag/v8.11.0","name":"https://github.com/npm/cli/releases/tag/v8.11.0","refsource":"MISC","tags":[],"title":"Release v8.11.0 · npm/cli · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/nodejs/node/releases/tag/v16.15.1","name":"https://github.com/nodejs/node/releases/tag/v16.15.1","refsource":"MISC","tags":[],"title":"Release 2022-06-01, Version 16.15.1 'Gallium' (LTS), @BethGriggs prepared by @juanarbol · nodejs/node · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/npm/npm-packlist","name":"https://github.com/npm/npm-packlist","refsource":"MISC","tags":[],"title":"GitHub - npm/npm-packlist: Walk through a folder and figure out what goes in an npm package","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20220722-0007/","name":"https://security.netapp.com/advisory/ntap-20220722-0007/","refsource":"CONFIRM","tags":[],"title":"CVE-2022-29244 NPM Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-29244","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29244","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"29244","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"ontap_select_deploy_administration_utility","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29244","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"npmjs","cpe5":"npm","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-29244","qid":"160111","title":"Oracle Enterprise Linux Security Update for nodejs and nodejs-nodemon (ELSA-2022-6595)"},{"cve":"CVE-2022-29244","qid":"240676","title":"Red Hat Update for nodejs and nodejs-nodemon (RHSA-2022:6595)"},{"cve":"CVE-2022-29244","qid":"753302","title":"SUSE Enterprise Linux Security Update for nodejs16 (SUSE-SU-2022:3251-1)"},{"cve":"CVE-2022-29244","qid":"753318","title":"SUSE Enterprise Linux Security Update for nodejs16 (SUSE-SU-2022:3250-1)"},{"cve":"CVE-2022-29244","qid":"940678","title":"AlmaLinux Security Update for nodejs and nodejs-nodemon (ALSA-2022:6595)"},{"cve":"CVE-2022-29244","qid":"960531","title":"Rocky Linux Security Update for nodejs and nodejs-nodemon (RLSA-2022:6595)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-29244","STATE":"PUBLIC","TITLE":"npm packing does not respect root-level ignore files in workspaces"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"npm","version":{"version_data":[{"version_affected":">=","version_name":"7.9.0","version_value":"7.9.0"},{"version_affected":"<","version_name":"8.11.0","version_value":"8.11.0"}]}}]},"vendor_name":"npm"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm."}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200 Information Exposure"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52","name":"https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52"},{"refsource":"MISC","url":"https://github.com/npm/npm-packlist","name":"https://github.com/npm/npm-packlist"},{"refsource":"MISC","url":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish","name":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish"},{"refsource":"MISC","url":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpack","name":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpack"},{"refsource":"MISC","url":"https://github.com/nodejs/node/pull/43210","name":"https://github.com/nodejs/node/pull/43210"},{"refsource":"MISC","url":"https://github.com/npm/cli/releases/tag/v8.11.0","name":"https://github.com/npm/cli/releases/tag/v8.11.0"},{"refsource":"MISC","url":"https://github.com/nodejs/node/releases/tag/v16.15.1","name":"https://github.com/nodejs/node/releases/tag/v16.15.1"},{"refsource":"MISC","url":"https://github.com/nodejs/node/releases/tag/v17.9.1","name":"https://github.com/nodejs/node/releases/tag/v17.9.1"},{"refsource":"MISC","url":"https://github.com/nodejs/node/releases/tag/v18.3.0","name":"https://github.com/nodejs/node/releases/tag/v18.3.0"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20220722-0007/","url":"https://security.netapp.com/advisory/ntap-20220722-0007/"}]},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-06-13 14:15:00","lastModifiedDate":"2022-10-27 16:25:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*","versionStartIncluding":"7.9.0","versionEndExcluding":"8.11.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}