CVE-2021-22931

Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:nextgen_api:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:50

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory
References () https://hackerone.com/reports/1178337 - Exploit, Issue Tracking, Third Party Advisory () https://hackerone.com/reports/1178337 - Exploit, Issue Tracking, Third Party Advisory
References () https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ - Patch, Vendor Advisory () https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ - Patch, Vendor Advisory
References () https://security.gentoo.org/glsa/202401-02 - () https://security.gentoo.org/glsa/202401-02 -
References () https://security.netapp.com/advisory/ntap-20210923-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210923-0001/ - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20211022-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20211022-0003/ - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujul2022.html - Third Party Advisory () https://www.oracle.com/security-alerts/cpujul2022.html - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory

05 Jan 2024, 10:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-02 -

Information

Published : 2021-08-16 19:15

Updated : 2024-11-21 05:50


NVD link : CVE-2021-22931

Mitre link : CVE-2021-22931

CVE.ORG link : CVE-2021-22931


JSON object : View

Products Affected

siemens

  • sinec_infrastructure_network_services

netapp

  • nextgen_api
  • oncommand_insight
  • snapcenter
  • active_iq_unified_manager
  • oncommand_workflow_automation

oracle

  • graalvm
  • mysql_cluster
  • peoplesoft_enterprise_peopletools

nodejs

  • node.js
CWE
CWE-170

Improper Null Termination

CWE-20

Improper Input Validation