CVE-2021-44532

Severity
5.3MEDIUM
EPSS
0.1%
top 67.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 24
Latest updateFeb 25

Description

Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injectio

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages10 packages

CVEListV5nodejs/node4.04.*+13
NVDnodejs/node.js14.0.014.18.3+3
Debiannodejs< 12.22.12~dfsg-1~deb11u1+3
NVDoracle/mysql_server8.0.08.0.28+1

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-jg6g-8j59-vr29: Node2022-02-25
OSV
CVE-2021-44532: Node2022-02-24
CVEList
CVE-2021-44532: Node2022-02-24

📋Vendor Advisories

3
Microsoft
Node.js < 12.22.9 < 14.18.3 < 16.13.2 and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connec2022-02-08
Red Hat
nodejs: Certificate Verification Bypass via String Injection2022-01-10
Debian
CVE-2021-44532: nodejs - Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alt...2021