CVE-2021-22939

If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:netapp:nextgen_api:-:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:50

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory
References () https://hackerone.com/reports/1278254 - Exploit, Issue Tracking, Third Party Advisory () https://hackerone.com/reports/1278254 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html - Issue Tracking, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html - Issue Tracking, Third Party Advisory
References () https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ - Patch, Vendor Advisory () https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/ - Patch, Vendor Advisory
References () https://security.gentoo.org/glsa/202401-02 - () https://security.gentoo.org/glsa/202401-02 -
References () https://security.netapp.com/advisory/ntap-20210917-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210917-0003/ - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory

05 Jan 2024, 10:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-02 -

Information

Published : 2021-08-16 19:15

Updated : 2024-11-21 05:50


NVD link : CVE-2021-22939

Mitre link : CVE-2021-22939

CVE.ORG link : CVE-2021-22939


JSON object : View

Products Affected

siemens

  • sinec_infrastructure_network_services

netapp

  • nextgen_api

oracle

  • mysql_cluster
  • peoplesoft_enterprise_peopletools
  • jd_edwards_enterpriseone_tools
  • graalvm

debian

  • debian_linux

nodejs

  • node.js
CWE
CWE-295

Improper Certificate Validation