UBUNTU-CVE-2022-43548

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2022-43548
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-43548.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-43548
Related
Published
2022-12-05T22:15:00Z
Modified
2022-12-05T22:15:00Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.

References

Affected packages

Ubuntu:Pro:18.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@8.10.0~dfsg-2ubuntu0.4+esm4?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.10.0~dfsg-2ubuntu0.4+esm4

Affected versions

6.*

6.11.4~dfsg-1ubuntu1
6.11.4~dfsg-1ubuntu2
6.12.0~dfsg-1ubuntu1
6.12.0~dfsg-2ubuntu1
6.12.0~dfsg-2ubuntu2

8.*

8.10.0~dfsg-2
8.10.0~dfsg-2ubuntu0.2
8.10.0~dfsg-2ubuntu0.3
8.10.0~dfsg-2ubuntu0.4
8.10.0~dfsg-2ubuntu0.4+esm1
8.10.0~dfsg-2ubuntu0.4+esm2
8.10.0~dfsg-2ubuntu0.4+esm3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "nodejs-dev": "8.10.0~dfsg-2ubuntu0.4+esm4",
            "nodejs-doc": "8.10.0~dfsg-2ubuntu0.4+esm4",
            "nodejs": "8.10.0~dfsg-2ubuntu0.4+esm4",
            "nodejs-dbgsym": "8.10.0~dfsg-2ubuntu0.4+esm4"
        }
    ]
}

Ubuntu:20.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@10.19.0~dfsg-3ubuntu1.3?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.19.0~dfsg-3ubuntu1.3

Affected versions

10.*

10.15.2~dfsg-2ubuntu1
10.17.0~dfsg-2ubuntu4
10.17.0~dfsg-2ubuntu6
10.19.0~dfsg-3ubuntu1
10.19.0~dfsg-3ubuntu1.1
10.19.0~dfsg-3ubuntu1.2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "libnode64-dbgsym": "10.19.0~dfsg-3ubuntu1.3",
            "libnode64": "10.19.0~dfsg-3ubuntu1.3",
            "nodejs-doc": "10.19.0~dfsg-3ubuntu1.3",
            "nodejs": "10.19.0~dfsg-3ubuntu1.3",
            "libnode-dev": "10.19.0~dfsg-3ubuntu1.3",
            "nodejs-dbgsym": "10.19.0~dfsg-3ubuntu1.3"
        }
    ]
}

Ubuntu:22.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@12.22.9~dfsg-1ubuntu3.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.22.9~dfsg-1ubuntu3.2

Affected versions

12.*

12.22.5~dfsg-5ubuntu1
12.22.7~dfsg-2ubuntu1
12.22.7~dfsg-2ubuntu3
12.22.9~dfsg-1ubuntu2
12.22.9~dfsg-1ubuntu3
12.22.9~dfsg-1ubuntu3.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "nodejs-doc": "12.22.9~dfsg-1ubuntu3.2",
            "libnode72": "12.22.9~dfsg-1ubuntu3.2",
            "nodejs": "12.22.9~dfsg-1ubuntu3.2",
            "libnode-dev": "12.22.9~dfsg-1ubuntu3.2",
            "libnode72-dbgsym": "12.22.9~dfsg-1ubuntu3.2",
            "nodejs-dbgsym": "12.22.9~dfsg-1ubuntu3.2"
        }
    ]
}