vulnerability
Rocky Linux: CVE-2022-43548: nodejs-and-nodejs-nodemon (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Dec 5, 2022 | Mar 12, 2024 | Oct 6, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Dec 5, 2022
Added
Mar 12, 2024
Modified
Oct 6, 2025
Description
A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.
Solutions
rocky-upgrade-nodejsrocky-upgrade-nodejs-debuginforocky-upgrade-nodejs-debugsourcerocky-upgrade-nodejs-develrocky-upgrade-nodejs-full-i18nrocky-upgrade-nodejs-libsrocky-upgrade-nodejs-libs-debuginforocky-upgrade-npm
References
- CVE-2022-43548
- https://attackerkb.com/topics/CVE-2022-43548
- CWE-78
- URL-https://errata.rockylinux.org/RLSA-2022:8832
- URL-https://errata.rockylinux.org/RLSA-2022:8833
- URL-https://errata.rockylinux.org/RLSA-2022:9073
- URL-https://errata.rockylinux.org/RLSA-2023:0050
- URL-https://errata.rockylinux.org/RLSA-2023:0321
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.