Lucene search

K
mageiaGentoo FoundationMGASA-2023-0053
HistoryFeb 21, 2023 - 12:25 a.m.

Updated nodejs-qs packages fix security vulnerability

2023-02-2100:25:36
Gentoo Foundation
advisories.mageia.org
326
nodejs
security vulnerability
fix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.019

Percentile

88.8%

nodejs qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[proto]=b&a;[proto]&a;[length]=100000000. (CVE-2022-24999)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchnodejs-qs< 6.5.3-1nodejs-qs-6.5.3-1.mga8

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.019

Percentile

88.8%