QID 354509

Date Published: 2022-12-21

QID 354509: Amazon Linux Security Advisory for nodejs : ALAS2022-2022-019

A flaw was found in node.js where it accepted a certificate's subject alternative names (san) entry, as opposed to what is specified by the https protocol.
This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host. (
( CVE-2021-44531) it was found that node.js did not safely read the x509 certificate generalname format properly, resulting in data injection.
A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host. (
( CVE-2021-44532) a flaw was found in node.js, where it did not properly handle multi-value relative distinguished names.
This flaw allows a specially crafted x509 certificate to produce a false multi-value relative distinguished name and to inject arbitrary data in node.js libraries. (
( CVE-2021-44533) prototype pollution via console.table properties (cve-2022-21824)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.2 severity.
  • CVSS V2 rated as High - 6.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-019 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354509

    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-019 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-019.html