Lucene search

K
cvelistDIVDCVELIST:CVE-2022-2421
HistoryOct 25, 2022 - 12:00 a.m.

CVE-2022-2421 Socket.io - Improper type validation in attachment parsing

2022-10-2500:00:00
CWE-89
DIVD
www.cve.org
1
socket.io
type validation
attachment parsing
cve-2022-2421
security vulnerability
query object

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.2%

Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.

CNA Affected

[
  {
    "product": "Socket.io-Parser",
    "vendor": "Socket.io",
    "versions": [
      {
        "lessThan": "4.2.1",
        "status": "affected",
        "version": "4.x",
        "versionType": "custom"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.2%

Related for CVELIST:CVE-2022-2421