• CVE-2022-24999

发布时间: 2024年3月29日

修改时间: 2024年10月31日

概要

qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has deps: qs@6.9.7 in its release description, is not vulnerable).

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Network Network
CVSS评分 7.5 7.5
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-1528 nodejs-qs security update 2024年4月12日
KylinSec-SA-2024-3149 nodejs-qs security update 2024年4月12日

影响产品

产品 状态
KY3.4-4A nodejs-qs Fixed
KY3.4-5 nodejs-qs Fixed
KY3.5.1 nodejs-qs Fixed
KY3.5.2 nodejs-qs Fixed