CVE-2022-24822

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24822
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24822.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-24822
Aliases
Related
Published
2022-04-06T18:15:08Z
Modified
2025-01-08T14:08:59.526620Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the Trailer header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. @podium/layout, which is the main way developers/users are vulnerable to this exploit, has been patched in version 4.6.110. All earlier versions are vulnerable.@podium/proxy, which is the source of the vulnerability and is used by @podium/layout has been patched in version 4.2.74. All earlier versions are vulnerable. It is not easily possible to work around this issue without upgrading.

References

Affected packages

Git / github.com/podium-lib/layout

Affected ranges

Type
GIT
Repo
https://github.com/podium-lib/layout
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
GIT
Repo
https://github.com/podium-lib/proxy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v2.*

v2.0.0-beta.11
v2.0.0-beta.18
v2.0.0-beta.5
v2.0.0-beta.6
v2.0.1
v2.0.2
v2.1.0
v2.1.1
v2.2.0
v2.4.0
v2.4.1
v2.4.2
v2.4.3
v2.4.4
v2.4.5
v2.5.0
v2.5.1

v3.*

v3.0.0
v3.0.0-beta.1
v3.0.1
v3.0.2
v3.0.3
v3.0.4

v4.*

v4.0.0
v4.0.0-next
v4.0.0-next.1
v4.0.0-next.2
v4.0.0-next.3
v4.0.0-next.4
v4.0.0-next.5
v4.0.0-next.6
v4.0.0-next.7
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.0.5
v4.0.6
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.1.5
v4.2.0
v4.2.0-next
v4.2.0-next.1
v4.2.0-next.2
v4.2.0-next.3
v4.2.0-next.4
v4.2.0-next.5
v4.2.1
v4.2.10
v4.2.11
v4.2.12
v4.2.13
v4.2.14
v4.2.15
v4.2.16
v4.2.17
v4.2.18
v4.2.19
v4.2.2
v4.2.20
v4.2.21
v4.2.22
v4.2.23
v4.2.24
v4.2.25
v4.2.26
v4.2.27
v4.2.28
v4.2.29
v4.2.3
v4.2.30
v4.2.31
v4.2.32
v4.2.33
v4.2.34
v4.2.35
v4.2.36
v4.2.37
v4.2.38
v4.2.39
v4.2.4
v4.2.40
v4.2.41
v4.2.42
v4.2.43
v4.2.44
v4.2.45
v4.2.46
v4.2.47
v4.2.48
v4.2.49
v4.2.5
v4.2.50
v4.2.51
v4.2.52
v4.2.53
v4.2.54
v4.2.55
v4.2.56
v4.2.57
v4.2.58
v4.2.59
v4.2.6
v4.2.60
v4.2.61
v4.2.62
v4.2.63
v4.2.64
v4.2.65
v4.2.66
v4.2.67
v4.2.68
v4.2.69
v4.2.7
v4.2.70
v4.2.71
v4.2.72
v4.2.73
v4.2.8
v4.2.9
v4.3.0
v4.3.1
v4.4.0
v4.4.1
v4.4.2
v4.4.3
v4.4.4
v4.5.0
v4.5.1
v4.6.0
v4.6.1
v4.6.10
v4.6.100
v4.6.101
v4.6.102
v4.6.103
v4.6.104
v4.6.105
v4.6.106
v4.6.107
v4.6.108
v4.6.109
v4.6.11
v4.6.12
v4.6.13
v4.6.14
v4.6.15
v4.6.16
v4.6.17
v4.6.18
v4.6.19
v4.6.2
v4.6.20
v4.6.21
v4.6.22
v4.6.23
v4.6.24
v4.6.25
v4.6.26
v4.6.27
v4.6.28
v4.6.29
v4.6.3
v4.6.30
v4.6.31
v4.6.32
v4.6.33
v4.6.34
v4.6.35
v4.6.36
v4.6.37
v4.6.38
v4.6.39
v4.6.4
v4.6.40
v4.6.41
v4.6.42
v4.6.43
v4.6.44
v4.6.45
v4.6.46
v4.6.47
v4.6.48
v4.6.49
v4.6.5
v4.6.50
v4.6.51
v4.6.52
v4.6.53
v4.6.54
v4.6.55
v4.6.56
v4.6.57
v4.6.58
v4.6.59
v4.6.6
v4.6.60
v4.6.61
v4.6.62
v4.6.63
v4.6.64
v4.6.65
v4.6.66
v4.6.67
v4.6.68
v4.6.69
v4.6.7
v4.6.70
v4.6.71
v4.6.72
v4.6.73
v4.6.74
v4.6.75
v4.6.76
v4.6.77
v4.6.78
v4.6.79
v4.6.8
v4.6.80
v4.6.81
v4.6.82
v4.6.83
v4.6.84
v4.6.85
v4.6.86
v4.6.87
v4.6.88
v4.6.89
v4.6.9
v4.6.90
v4.6.91
v4.6.92
v4.6.93
v4.6.94
v4.6.95
v4.6.96
v4.6.97
v4.6.98
v4.6.99