Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
References
Link | Resource |
---|---|
https://hackerone.com/reports/1429694 | Exploit Mitigation Third Party Advisory |
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/ | Release Notes Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220325-0007/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5170 | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2022-02-24 19:15
Updated : 2024-02-28 19:09
NVD link : CVE-2021-44533
Mitre link : CVE-2021-44533
CVE.ORG link : CVE-2021-44533
JSON object : View
Products Affected
debian
- debian_linux
oracle
- mysql_connectors
- mysql_server
- mysql_cluster
- mysql_enterprise_monitor
- graalvm
- peoplesoft_enterprise_peopletools
- mysql_workbench
nodejs
- node.js
CWE
CWE-295
Improper Certificate Validation