Lucene search

K
osvGoogleOSV:RLSA-2023:2655
HistoryMay 25, 2023 - 7:53 p.m.

Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update

2023-05-2519:53:09
Google
osv.dev
24
node.js
javascript
security
bug fix
enhancement
cve-2022-4904
cve-2022-25881
cve-2023-23918
cve-2023-23936
cve-2023-23920
cve-2023-24807
upstream version

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

EPSS

0.002

Percentile

57.4%

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (16.19.1), nodejs-nodemon (2.0.20).

Security Fix(es):

  • c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)

  • http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)

  • Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)

  • Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936)

  • Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)

  • Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

EPSS

0.002

Percentile

57.4%