ID

VAR-202207-0381


CVE

CVE-2022-32212


TITLE

Node.js Foundation  of  Node.js  in products from other multiple vendors  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-013369

DESCRIPTION

A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks. Node.js Foundation of Node.js For products from other vendors, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Node.js July 7th 2022 Security Releases: DNS rebinding in --inspect via invalid IP addresses. When an invalid IPv4 address is provided (for instance 10.0.2.555 is provided), browsers (such as Firefox) will make DNS requests to the DNS server, providing a vector for an attacker-controlled DNS server or a MITM who can spoof DNS responses to perform a rebinding attack and hence connect to the WebSocket debugger, allowing for arbitrary code execution. This is a bypass of CVE-2021-22884. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security and bug fix update Advisory ID: RHSA-2022:6389-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2022:6389 Issue date: 2022-09-08 CVE Names: CVE-2022-32212 CVE-2022-32213 CVE-2022-32214 CVE-2022-32215 CVE-2022-33987 ==================================================================== 1. Summary: An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.20.0). Security Fix(es): * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * rh-nodejs14-nodejs: rebase to latest upstream release (BZ#2106673) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2102001 - CVE-2022-33987 got: missing verification of requested URLs allows redirects to UNIX sockets 2105422 - CVE-2022-32212 nodejs: DNS rebinding in --inspect via invalid IP addresses 2105426 - CVE-2022-32215 nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding 2105428 - CVE-2022-32214 nodejs: HTTP request smuggling due to improper delimiting of header fields 2105430 - CVE-2022-32213 nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding 2106673 - rh-nodejs14-nodejs: rebase to latest upstream release [rhscl-3.8.z] 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-nodejs14-nodejs-14.20.0-2.el7.src.rpm rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.src.rpm noarch: rh-nodejs14-nodejs-docs-14.20.0-2.el7.noarch.rpm rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.noarch.rpm ppc64le: rh-nodejs14-nodejs-14.20.0-2.el7.ppc64le.rpm rh-nodejs14-nodejs-debuginfo-14.20.0-2.el7.ppc64le.rpm rh-nodejs14-nodejs-devel-14.20.0-2.el7.ppc64le.rpm rh-nodejs14-npm-6.14.17-14.20.0.2.el7.ppc64le.rpm s390x: rh-nodejs14-nodejs-14.20.0-2.el7.s390x.rpm rh-nodejs14-nodejs-debuginfo-14.20.0-2.el7.s390x.rpm rh-nodejs14-nodejs-devel-14.20.0-2.el7.s390x.rpm rh-nodejs14-npm-6.14.17-14.20.0.2.el7.s390x.rpm x86_64: rh-nodejs14-nodejs-14.20.0-2.el7.x86_64.rpm rh-nodejs14-nodejs-debuginfo-14.20.0-2.el7.x86_64.rpm rh-nodejs14-nodejs-devel-14.20.0-2.el7.x86_64.rpm rh-nodejs14-npm-6.14.17-14.20.0.2.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-nodejs14-nodejs-14.20.0-2.el7.src.rpm rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.src.rpm noarch: rh-nodejs14-nodejs-docs-14.20.0-2.el7.noarch.rpm rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.noarch.rpm x86_64: rh-nodejs14-nodejs-14.20.0-2.el7.x86_64.rpm rh-nodejs14-nodejs-debuginfo-14.20.0-2.el7.x86_64.rpm rh-nodejs14-nodejs-devel-14.20.0-2.el7.x86_64.rpm rh-nodejs14-npm-6.14.17-14.20.0.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-32212 https://access.redhat.com/security/cve/CVE-2022-32213 https://access.redhat.com/security/cve/CVE-2022-32214 https://access.redhat.com/security/cve/CVE-2022-32215 https://access.redhat.com/security/cve/CVE-2022-33987 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYxnqU9zjgjWX9erEAQipBg/+NJmkBsKEPkFHZAiZhGKiwIkwaFcHK+e/ ODClFTTT9SkkMBheuc9HQDmwukaVlLMvbOJSVL/6NvuLQvOcQHtprOAJXr3I6KQm VScJRQny4et+D/N3bJJiuhqe9YY9Bh+EP7omS4aq2UuphEhkuTSQ0V2+Fa4O8wdZ bAhUhU660Q6aGzNGvcyz8vi7ohmOFZS94/x2Lr6cBG8LF0dmr/pIw+uPlO36ghXF IPEM3VcGisTGQRg2Xy5yqeouK1S+YAcZ1f0QUOePP+WRhIecfmG3cj6oYTRnrOyq +62525BHDNjIz55z6H32dKBIy+r+HT7WaOGgPwvH+ugmlH6NyKHjSyy+IJoglkfM 4+QA0zun7WhLet5y4jmsWCpT3mOCWj7h+iW6IqTlfcad3wCQ6OnySRq67W3GDq+M 3kdUdBoyfLm1vzLceEF4AK8qChj7rVl8x0b4v8OfRGv6ZEIe+BfJYNzI9HeuIE91 BYtLGe18vMs5mcWxcYMWlfAgzVSGTaqaaBie9qPtAThs00lJd9oRf/Mfga42/6vI nBLHwE3NyPyKfaLvcyLa/oPwGnOhKyPtD8HeN2MORm6RUeUClaq9s+ihDIPvbyLX bcKKdjGoJDWyJy2yU2GkVwrbF6gcKgdvo2uFckOpouKQ4P9KEooI/15fLy8NPIZz hGdWoRKL34w\xcePC -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 9) - aarch64, noarch, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5326-1 security@debian.org https://www.debian.org/security/ Aron Xu January 24, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : nodejs CVE ID : CVE-2022-32212 CVE-2022-32213 CVE-2022-32214 CVE-2022-32215 CVE-2022-35255 CVE-2022-35256 CVE-2022-43548 Multiple vulnerabilities were discovered in Node.js, which could result in HTTP request smuggling, bypass of host IP address validation and weak randomness setup. For the stable distribution (bullseye), these problems have been fixed in version 12.22.12~dfsg-1~deb11u3. We recommend that you upgrade your nodejs packages. For the detailed security status of nodejs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nodejs Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmPQNhIACgkQEMKTtsN8 TjaRmA/+KDFkQcd2sE/eAAx9cVikICNkfu7uIVKHpeDH9o5oq5M2nj4zHJCeAArp WblguyZwEtqzAOO2WesbrmwfXLmglhrNZwRMOrsbu63JxSnecp7qcMwR8A4JWdmd Txb4aZr6Prmwq6fT0G3K6oV8Hw+OeqYA/RZKenxtkBf/jdzVahGJHJ/NrFKKWVQW xbqHwCkP7uUlm+5UR5XzNrodTRCQYHJvUmDUrjEOjM6x+sqYirKWiERN0A14kVn9 0Ufrw6+Z2tKhdKFZfU1BtDthhlH/nybz0h3aHsk+E5/vx20WAURiCEDVi7nf8+Rf EtbCxaqV+/xVoPmXStHY/ogCo8CgRVsyYUIemgi4q5LwVx/Oqjm2CJ/xCwOKh0E2 idXLJfLSpxxBe598MUn9iKbnFFCN9DQZXf7BYs3djtn8ALFVBSHZSF1QXFoFQ86w Y9xGhBQzfEgCoEW7H4S30ZQ+Gz+ZnOMCSH+MKIMtSpqbc7wLtrKf839DO6Uux7B7 u0WR3lZlsihi92QKq9X/VRkyy8ZiA2TYy3IE+KDKlXDHKls9FR9BUClYe9L8RiRu boP8KPFUHUsSVaTzkufMStdKkcXCqgj/6KhJL6E9ZunTBpTmqx1Ty7/N2qktLFnH ujrffzV3rCE6eIg7ps8OdZbjCfqUqmQk9/pV6ZDjymqjZ1LKZDs\xfeRn -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6491-1 November 21, 2023 nodejs vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in Node.js. Software Description: - nodejs: An open-source, cross-platform JavaScript runtime environment. Details: Axel Chong discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2022-32212) Zeyu Zhang discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-32213, CVE-2022-32214, CVE-2022-32215) It was discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-35256) It was discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-43548) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: libnode-dev 12.22.9~dfsg-1ubuntu3.2 libnode72 12.22.9~dfsg-1ubuntu3.2 nodejs 12.22.9~dfsg-1ubuntu3.2 nodejs-doc 12.22.9~dfsg-1ubuntu3.2 Ubuntu 20.04 LTS: libnode-dev 10.19.0~dfsg-3ubuntu1.3 libnode64 10.19.0~dfsg-3ubuntu1.3 nodejs 10.19.0~dfsg-3ubuntu1.3 nodejs-doc 10.19.0~dfsg-3ubuntu1.3 Ubuntu 18.04 LTS (Available with Ubuntu Pro): nodejs 8.10.0~dfsg-2ubuntu0.4+esm4 nodejs-dev 8.10.0~dfsg-2ubuntu0.4+esm4 nodejs-doc 8.10.0~dfsg-2ubuntu0.4+esm4 In general, a standard system update will make all the necessary changes

Trust: 2.34

sources: NVD: CVE-2022-32212 // JVNDB: JVNDB-2022-013369 // VULMON: CVE-2022-32212 // PACKETSTORM: 168305 // PACKETSTORM: 169410 // PACKETSTORM: 168442 // PACKETSTORM: 168358 // PACKETSTORM: 170727 // PACKETSTORM: 175817 // PACKETSTORM: 168359

AFFECTED PRODUCTS

vendor:nodejsmodel:node.jsscope:ltversion:16.17.1

Trust: 1.0

vendor:siemensmodel:sinec insscope:eqversion:1.0

Trust: 1.0

vendor:siemensmodel:sinec insscope:ltversion:1.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:16.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:14.20.1

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:18.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:18.5.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:14.15.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:16.12.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:14.14.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:14.0.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:16.13.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:37

Trust: 1.0

vendor:シーメンスmodel:sinec insscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:node jsmodel:node.jsscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-013369 // NVD: CVE-2022-32212

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-32212
value: HIGH

Trust: 1.0

NVD: CVE-2022-32212
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202207-684
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-32212
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-32212
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-013369 // CNNVD: CNNVD-202207-684 // NVD: CVE-2022-32212

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.0

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-013369 // NVD: CVE-2022-32212

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 175817 // CNNVD: CNNVD-202207-684

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202207-684

EXTERNAL IDS

db:NVDid:CVE-2022-32212

Trust: 4.0

db:HACKERONEid:1632921

Trust: 2.4

db:JVNDBid:JVNDB-2022-013369

Trust: 0.8

db:PACKETSTORMid:168305

Trust: 0.7

db:PACKETSTORMid:169410

Trust: 0.7

db:PACKETSTORMid:168442

Trust: 0.7

db:PACKETSTORMid:168358

Trust: 0.7

db:PACKETSTORMid:170727

Trust: 0.7

db:CS-HELPid:SB2022072639

Trust: 0.6

db:CS-HELPid:SB2022071338

Trust: 0.6

db:CS-HELPid:SB2022072522

Trust: 0.6

db:CS-HELPid:SB2022071612

Trust: 0.6

db:CS-HELPid:SB2022071827

Trust: 0.6

db:AUSCERTid:ESB-2022.3586

Trust: 0.6

db:AUSCERTid:ESB-2022.3488

Trust: 0.6

db:AUSCERTid:ESB-2022.3487

Trust: 0.6

db:AUSCERTid:ESB-2023.0997

Trust: 0.6

db:AUSCERTid:ESB-2022.3505

Trust: 0.6

db:AUSCERTid:ESB-2022.4101

Trust: 0.6

db:AUSCERTid:ESB-2022.4681

Trust: 0.6

db:AUSCERTid:ESB-2022.3673

Trust: 0.6

db:AUSCERTid:ESB-2022.4136

Trust: 0.6

db:SIEMENSid:SSA-332410

Trust: 0.6

db:CNNVDid:CNNVD-202207-684

Trust: 0.6

db:VULMONid:CVE-2022-32212

Trust: 0.1

db:PACKETSTORMid:175817

Trust: 0.1

db:PACKETSTORMid:168359

Trust: 0.1

sources: VULMON: CVE-2022-32212 // JVNDB: JVNDB-2022-013369 // PACKETSTORM: 168305 // PACKETSTORM: 169410 // PACKETSTORM: 168442 // PACKETSTORM: 168358 // PACKETSTORM: 170727 // PACKETSTORM: 175817 // PACKETSTORM: 168359 // CNNVD: CNNVD-202207-684 // NVD: CVE-2022-32212

REFERENCES

url:https://hackerone.com/reports/1632921

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-32212

Trust: 1.5

url:https://access.redhat.com/security/cve/cve-2022-32212

Trust: 1.1

url:https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-32215

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-32214

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-32213

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7160

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/vmqk5l5sbyd47qqz67lemhnq662gh3oy/

Trust: 0.6

url:https://www.debian.org/security/2023/dsa-5326

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2icg6csib3guwh5dusqevx53mojw7lyk/

Trust: 0.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf

Trust: 0.6

url:https://security.netapp.com/advisory/ntap-20220915-0001/

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-22884

Trust: 0.6

url:https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/qcnn3yg2bcls4zekj3clsut6as7axth3/

Trust: 0.6

url:https://packetstormsecurity.com/files/170727/debian-security-advisory-5326-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3505

Trust: 0.6

url:https://packetstormsecurity.com/files/168305/red-hat-security-advisory-2022-6389-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072522

Trust: 0.6

url:https://packetstormsecurity.com/files/168442/red-hat-security-advisory-2022-6595-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168358/red-hat-security-advisory-2022-6449-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0997

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4681

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072639

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4101

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3673

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4136

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3487

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071827

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3586

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3488

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-32212/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071612

Trust: 0.6

url:https://packetstormsecurity.com/files/169410/red-hat-security-advisory-2022-6985-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071338

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-32214

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-32213

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-33987

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-32215

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-33987

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-3807

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3807

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-35256

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-43548

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2022:6389

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6985

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29244

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28469

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29244

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7788

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6449

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35255

Trust: 0.1

url:https://security-tracker.debian.org/tracker/nodejs

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nodejs/12.22.9~dfsg-1ubuntu3.2

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6491-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nodejs/10.19.0~dfsg-3ubuntu1.3

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6448

Trust: 0.1

sources: VULMON: CVE-2022-32212 // JVNDB: JVNDB-2022-013369 // PACKETSTORM: 168305 // PACKETSTORM: 169410 // PACKETSTORM: 168442 // PACKETSTORM: 168358 // PACKETSTORM: 170727 // PACKETSTORM: 175817 // PACKETSTORM: 168359 // CNNVD: CNNVD-202207-684 // NVD: CVE-2022-32212

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 168305 // PACKETSTORM: 169410 // PACKETSTORM: 168442 // PACKETSTORM: 168358 // PACKETSTORM: 168359

SOURCES

db:VULMONid:CVE-2022-32212
db:JVNDBid:JVNDB-2022-013369
db:PACKETSTORMid:168305
db:PACKETSTORMid:169410
db:PACKETSTORMid:168442
db:PACKETSTORMid:168358
db:PACKETSTORMid:170727
db:PACKETSTORMid:175817
db:PACKETSTORMid:168359
db:CNNVDid:CNNVD-202207-684
db:NVDid:CVE-2022-32212

LAST UPDATE DATE

2024-12-21T20:49:18.458000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-013369date:2023-09-07T08:25:00
db:CNNVDid:CNNVD-202207-684date:2023-02-24T00:00:00
db:NVDid:CVE-2022-32212date:2023-02-23T20:15:12.057

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2022-013369date:2023-09-07T00:00:00
db:PACKETSTORMid:168305date:2022-09-08T14:41:32
db:PACKETSTORMid:169410date:2022-10-18T22:30:49
db:PACKETSTORMid:168442date:2022-09-21T13:47:04
db:PACKETSTORMid:168358date:2022-09-13T15:43:41
db:PACKETSTORMid:170727date:2023-01-25T16:09:12
db:PACKETSTORMid:175817date:2023-11-21T16:00:44
db:PACKETSTORMid:168359date:2022-09-13T15:43:55
db:CNNVDid:CNNVD-202207-684date:2022-07-08T00:00:00
db:NVDid:CVE-2022-32212date:2022-07-14T15:15:08.237