• CVE-2021-44532

发布时间: 2022年4月29日

修改时间: 2024年10月31日

概要

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Network Network
CVSS评分 5.3 5.3
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity Low Low
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2022-1374 Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option. 2022年5月11日
KylinSec-SA-2022-1429 nodejs security update 2022年4月29日

影响产品

产品 状态
KY3.4-4A nodejs Fixed
KY3.4-5 nodejs Fixed