QID 354509
Date Published: 2022-12-21
QID 354509: Amazon Linux Security Advisory for nodejs : ALAS2022-2022-019
A flaw was found in node.js where it accepted a certificate's subject alternative names (san) entry, as opposed to what is specified by the https protocol.
This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host. (
( CVE-2021-44531) it was found that node.js did not safely read the x509 certificate generalname format properly, resulting in data injection.
A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host. (
( CVE-2021-44532) a flaw was found in node.js, where it did not properly handle multi-value relative distinguished names.
This flaw allows a specially crafted x509 certificate to produce a false multi-value relative distinguished name and to inject arbitrary data in node.js libraries. (
( CVE-2021-44533) prototype pollution via console.table properties (cve-2022-21824)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2022-2022-019 -
alas.aws.amazon.com/AL2022/ALAS-2022-019.html
CVEs related to QID 354509
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2022-2022-019 | amazon linux 2022 |
|