nodejs node-js CVE-2022-21824 vulnerability in nodejs and Other Products
Published on February 24, 2022

product logo product logo product logo product logo product logo
Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

Vendor Advisory NVD

Weakness Type

What is a MAID Vulnerability?

The software does not properly protect an assumed-immutable element from being modified by an attacker. This occurs when a particular input is critical enough to the functioning of the application that it should not be modifiable at all, but it is. Certain resources are often assumed to be immutable when they are not, such as hidden form fields in web applications, cookies, and reverse DNS lookups.

CVE-2022-21824 has been classified to as a MAID vulnerability or weakness.


Products Associated with CVE-2022-21824

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-21824 are published in these products:

 
 
 
 
 
 
 
 
 
 
 

Affected Versions

NodeJS Node:

Exploit Probability

EPSS
0.34%
Percentile
55.89%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.