ID

VAR-202207-0588


CVE

CVE-2022-32215


TITLE

llhttp  of  llhttp  in products from other multiple vendors  HTTP  Request Smuggling Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-013243

DESCRIPTION

The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS). llhttp of llhttp For products from other vendors, HTTP There is a vulnerability related to request smuggling.Information may be obtained and information may be tampered with. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security and bug fix update Advisory ID: RHSA-2022:6389-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2022:6389 Issue date: 2022-09-08 CVE Names: CVE-2022-32212 CVE-2022-32213 CVE-2022-32214 CVE-2022-32215 CVE-2022-33987 ==================================================================== 1. Summary: An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.20.0). Security Fix(es): * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * rh-nodejs14-nodejs: rebase to latest upstream release (BZ#2106673) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2102001 - CVE-2022-33987 got: missing verification of requested URLs allows redirects to UNIX sockets 2105422 - CVE-2022-32212 nodejs: DNS rebinding in --inspect via invalid IP addresses 2105426 - CVE-2022-32215 nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding 2105428 - CVE-2022-32214 nodejs: HTTP request smuggling due to improper delimiting of header fields 2105430 - CVE-2022-32213 nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding 2106673 - rh-nodejs14-nodejs: rebase to latest upstream release [rhscl-3.8.z] 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-nodejs14-nodejs-14.20.0-2.el7.src.rpm rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.src.rpm noarch: rh-nodejs14-nodejs-docs-14.20.0-2.el7.noarch.rpm rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.noarch.rpm ppc64le: rh-nodejs14-nodejs-14.20.0-2.el7.ppc64le.rpm rh-nodejs14-nodejs-debuginfo-14.20.0-2.el7.ppc64le.rpm rh-nodejs14-nodejs-devel-14.20.0-2.el7.ppc64le.rpm rh-nodejs14-npm-6.14.17-14.20.0.2.el7.ppc64le.rpm s390x: rh-nodejs14-nodejs-14.20.0-2.el7.s390x.rpm rh-nodejs14-nodejs-debuginfo-14.20.0-2.el7.s390x.rpm rh-nodejs14-nodejs-devel-14.20.0-2.el7.s390x.rpm rh-nodejs14-npm-6.14.17-14.20.0.2.el7.s390x.rpm x86_64: rh-nodejs14-nodejs-14.20.0-2.el7.x86_64.rpm rh-nodejs14-nodejs-debuginfo-14.20.0-2.el7.x86_64.rpm rh-nodejs14-nodejs-devel-14.20.0-2.el7.x86_64.rpm rh-nodejs14-npm-6.14.17-14.20.0.2.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-nodejs14-nodejs-14.20.0-2.el7.src.rpm rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.src.rpm noarch: rh-nodejs14-nodejs-docs-14.20.0-2.el7.noarch.rpm rh-nodejs14-nodejs-nodemon-2.0.19-1.el7.noarch.rpm x86_64: rh-nodejs14-nodejs-14.20.0-2.el7.x86_64.rpm rh-nodejs14-nodejs-debuginfo-14.20.0-2.el7.x86_64.rpm rh-nodejs14-nodejs-devel-14.20.0-2.el7.x86_64.rpm rh-nodejs14-npm-6.14.17-14.20.0.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-32212 https://access.redhat.com/security/cve/CVE-2022-32213 https://access.redhat.com/security/cve/CVE-2022-32214 https://access.redhat.com/security/cve/CVE-2022-32215 https://access.redhat.com/security/cve/CVE-2022-33987 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYxnqU9zjgjWX9erEAQipBg/+NJmkBsKEPkFHZAiZhGKiwIkwaFcHK+e/ ODClFTTT9SkkMBheuc9HQDmwukaVlLMvbOJSVL/6NvuLQvOcQHtprOAJXr3I6KQm VScJRQny4et+D/N3bJJiuhqe9YY9Bh+EP7omS4aq2UuphEhkuTSQ0V2+Fa4O8wdZ bAhUhU660Q6aGzNGvcyz8vi7ohmOFZS94/x2Lr6cBG8LF0dmr/pIw+uPlO36ghXF IPEM3VcGisTGQRg2Xy5yqeouK1S+YAcZ1f0QUOePP+WRhIecfmG3cj6oYTRnrOyq +62525BHDNjIz55z6H32dKBIy+r+HT7WaOGgPwvH+ugmlH6NyKHjSyy+IJoglkfM 4+QA0zun7WhLet5y4jmsWCpT3mOCWj7h+iW6IqTlfcad3wCQ6OnySRq67W3GDq+M 3kdUdBoyfLm1vzLceEF4AK8qChj7rVl8x0b4v8OfRGv6ZEIe+BfJYNzI9HeuIE91 BYtLGe18vMs5mcWxcYMWlfAgzVSGTaqaaBie9qPtAThs00lJd9oRf/Mfga42/6vI nBLHwE3NyPyKfaLvcyLa/oPwGnOhKyPtD8HeN2MORm6RUeUClaq9s+ihDIPvbyLX bcKKdjGoJDWyJy2yU2GkVwrbF6gcKgdvo2uFckOpouKQ4P9KEooI/15fLy8NPIZz hGdWoRKL34w\xcePC -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 9) - aarch64, noarch, ppc64le, s390x, x86_64 3. ========================================================================== Ubuntu Security Notice USN-6491-1 November 21, 2023 nodejs vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in Node.js. Software Description: - nodejs: An open-source, cross-platform JavaScript runtime environment. Details: Axel Chong discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2022-32212) Zeyu Zhang discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-32213, CVE-2022-32214, CVE-2022-32215) It was discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-35256) It was discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-43548) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: libnode-dev 12.22.9~dfsg-1ubuntu3.2 libnode72 12.22.9~dfsg-1ubuntu3.2 nodejs 12.22.9~dfsg-1ubuntu3.2 nodejs-doc 12.22.9~dfsg-1ubuntu3.2 Ubuntu 20.04 LTS: libnode-dev 10.19.0~dfsg-3ubuntu1.3 libnode64 10.19.0~dfsg-3ubuntu1.3 nodejs 10.19.0~dfsg-3ubuntu1.3 nodejs-doc 10.19.0~dfsg-3ubuntu1.3 Ubuntu 18.04 LTS (Available with Ubuntu Pro): nodejs 8.10.0~dfsg-2ubuntu0.4+esm4 nodejs-dev 8.10.0~dfsg-2ubuntu0.4+esm4 nodejs-doc 8.10.0~dfsg-2ubuntu0.4+esm4 In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202405-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Node.js: Multiple Vulnerabilities Date: May 08, 2024 Bugs: #772422, #781704, #800986, #805053, #807775, #811273, #817938, #831037, #835615, #857111, #865627, #872692, #879617, #918086, #918614 ID: 202405-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in Node.js. Background ========= Node.js is a JavaScript runtime built on Chrome’s V8 JavaScript engine. Affected packages ================ Package Vulnerable Unaffected --------------- ------------ ------------ net-libs/nodejs < 16.20.2 >= 16.20.2 Description ========== Multiple vulnerabilities have been discovered in Node.js. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Node.js 20 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/nodejs-20.5.1" All Node.js 18 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/nodejs-18.17.1" All Node.js 16 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/nodejs-16.20.2" References ========= [ 1 ] CVE-2020-7774 https://nvd.nist.gov/vuln/detail/CVE-2020-7774 [ 2 ] CVE-2021-3672 https://nvd.nist.gov/vuln/detail/CVE-2021-3672 [ 3 ] CVE-2021-22883 https://nvd.nist.gov/vuln/detail/CVE-2021-22883 [ 4 ] CVE-2021-22884 https://nvd.nist.gov/vuln/detail/CVE-2021-22884 [ 5 ] CVE-2021-22918 https://nvd.nist.gov/vuln/detail/CVE-2021-22918 [ 6 ] CVE-2021-22930 https://nvd.nist.gov/vuln/detail/CVE-2021-22930 [ 7 ] CVE-2021-22931 https://nvd.nist.gov/vuln/detail/CVE-2021-22931 [ 8 ] CVE-2021-22939 https://nvd.nist.gov/vuln/detail/CVE-2021-22939 [ 9 ] CVE-2021-22940 https://nvd.nist.gov/vuln/detail/CVE-2021-22940 [ 10 ] CVE-2021-22959 https://nvd.nist.gov/vuln/detail/CVE-2021-22959 [ 11 ] CVE-2021-22960 https://nvd.nist.gov/vuln/detail/CVE-2021-22960 [ 12 ] CVE-2021-37701 https://nvd.nist.gov/vuln/detail/CVE-2021-37701 [ 13 ] CVE-2021-37712 https://nvd.nist.gov/vuln/detail/CVE-2021-37712 [ 14 ] CVE-2021-39134 https://nvd.nist.gov/vuln/detail/CVE-2021-39134 [ 15 ] CVE-2021-39135 https://nvd.nist.gov/vuln/detail/CVE-2021-39135 [ 16 ] CVE-2021-44531 https://nvd.nist.gov/vuln/detail/CVE-2021-44531 [ 17 ] CVE-2021-44532 https://nvd.nist.gov/vuln/detail/CVE-2021-44532 [ 18 ] CVE-2021-44533 https://nvd.nist.gov/vuln/detail/CVE-2021-44533 [ 19 ] CVE-2022-0778 https://nvd.nist.gov/vuln/detail/CVE-2022-0778 [ 20 ] CVE-2022-3602 https://nvd.nist.gov/vuln/detail/CVE-2022-3602 [ 21 ] CVE-2022-3786 https://nvd.nist.gov/vuln/detail/CVE-2022-3786 [ 22 ] CVE-2022-21824 https://nvd.nist.gov/vuln/detail/CVE-2022-21824 [ 23 ] CVE-2022-32212 https://nvd.nist.gov/vuln/detail/CVE-2022-32212 [ 24 ] CVE-2022-32213 https://nvd.nist.gov/vuln/detail/CVE-2022-32213 [ 25 ] CVE-2022-32214 https://nvd.nist.gov/vuln/detail/CVE-2022-32214 [ 26 ] CVE-2022-32215 https://nvd.nist.gov/vuln/detail/CVE-2022-32215 [ 27 ] CVE-2022-32222 https://nvd.nist.gov/vuln/detail/CVE-2022-32222 [ 28 ] CVE-2022-35255 https://nvd.nist.gov/vuln/detail/CVE-2022-35255 [ 29 ] CVE-2022-35256 https://nvd.nist.gov/vuln/detail/CVE-2022-35256 [ 30 ] CVE-2022-35948 https://nvd.nist.gov/vuln/detail/CVE-2022-35948 [ 31 ] CVE-2022-35949 https://nvd.nist.gov/vuln/detail/CVE-2022-35949 [ 32 ] CVE-2022-43548 https://nvd.nist.gov/vuln/detail/CVE-2022-43548 [ 33 ] CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 [ 34 ] CVE-2023-30582 https://nvd.nist.gov/vuln/detail/CVE-2023-30582 [ 35 ] CVE-2023-30583 https://nvd.nist.gov/vuln/detail/CVE-2023-30583 [ 36 ] CVE-2023-30584 https://nvd.nist.gov/vuln/detail/CVE-2023-30584 [ 37 ] CVE-2023-30586 https://nvd.nist.gov/vuln/detail/CVE-2023-30586 [ 38 ] CVE-2023-30587 https://nvd.nist.gov/vuln/detail/CVE-2023-30587 [ 39 ] CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 [ 40 ] CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 [ 41 ] CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 [ 42 ] CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 [ 43 ] CVE-2023-32003 https://nvd.nist.gov/vuln/detail/CVE-2023-32003 [ 44 ] CVE-2023-32004 https://nvd.nist.gov/vuln/detail/CVE-2023-32004 [ 45 ] CVE-2023-32005 https://nvd.nist.gov/vuln/detail/CVE-2023-32005 [ 46 ] CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 [ 47 ] CVE-2023-32558 https://nvd.nist.gov/vuln/detail/CVE-2023-32558 [ 48 ] CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202405-29 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 2.34

sources: NVD: CVE-2022-32215 // JVNDB: JVNDB-2022-013243 // VULMON: CVE-2022-32215 // PACKETSTORM: 168305 // PACKETSTORM: 169410 // PACKETSTORM: 168442 // PACKETSTORM: 168358 // PACKETSTORM: 175817 // PACKETSTORM: 178512 // PACKETSTORM: 168359

AFFECTED PRODUCTS

vendor:siemensmodel:sinec insscope:eqversion:1.0

Trust: 1.0

vendor:llhttpmodel:llhttpscope:ltversion:14.20.1

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:14.20.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:16.0.0

Trust: 1.0

vendor:llhttpmodel:llhttpscope:gteversion:16.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:18.5.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:16.16.0

Trust: 1.0

vendor:stormshieldmodel:management centerscope:ltversion:3.3.2

Trust: 1.0

vendor:llhttpmodel:llhttpscope:ltversion:16.17.1

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:14.14.0

Trust: 1.0

vendor:llhttpmodel:llhttpscope:ltversion:18.9.1

Trust: 1.0

vendor:llhttpmodel:llhttpscope:gteversion:14.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:16.12.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:14.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:16.13.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:18.0.0

Trust: 1.0

vendor:llhttpmodel:llhttpscope:gteversion:18.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:14.15.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:37

Trust: 1.0

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinec insscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:stormshieldmodel:management centerscope: - version: -

Trust: 0.8

vendor:node jsmodel:node.jsscope: - version: -

Trust: 0.8

vendor:llhttpmodel:llhttpscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-013243 // NVD: CVE-2022-32215

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-32215
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-32215
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202207-678
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-32215
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.1

Trust: 1.0

NVD: CVE-2022-32215
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNNVD: CNNVD-202207-678 // JVNDB: JVNDB-2022-013243 // NVD: CVE-2022-32215

PROBLEMTYPE DATA

problemtype:CWE-444

Trust: 1.0

problemtype:HTTP Request Smuggling (CWE-444) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-013243 // NVD: CVE-2022-32215

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 175817 // CNNVD: CNNVD-202207-678

TYPE

environmental issue

Trust: 0.6

sources: CNNVD: CNNVD-202207-678

EXTERNAL IDS

db:NVDid:CVE-2022-32215

Trust: 4.0

db:HACKERONEid:1501679

Trust: 2.4

db:SIEMENSid:SSA-332410

Trust: 2.4

db:ICS CERTid:ICSA-23-017-03

Trust: 0.8

db:JVNid:JVNVU90782730

Trust: 0.8

db:JVNDBid:JVNDB-2022-013243

Trust: 0.8

db:PACKETSTORMid:168305

Trust: 0.7

db:PACKETSTORMid:169410

Trust: 0.7

db:PACKETSTORMid:168442

Trust: 0.7

db:PACKETSTORMid:168358

Trust: 0.7

db:AUSCERTid:ESB-2022.3673

Trust: 0.6

db:AUSCERTid:ESB-2022.3488

Trust: 0.6

db:AUSCERTid:ESB-2022.3505

Trust: 0.6

db:AUSCERTid:ESB-2022.3487

Trust: 0.6

db:AUSCERTid:ESB-2022.4136

Trust: 0.6

db:AUSCERTid:ESB-2022.4101

Trust: 0.6

db:AUSCERTid:ESB-2022.3586

Trust: 0.6

db:AUSCERTid:ESB-2022.4681

Trust: 0.6

db:PACKETSTORMid:170727

Trust: 0.6

db:CS-HELPid:SB2022071827

Trust: 0.6

db:CS-HELPid:SB2022071338

Trust: 0.6

db:CS-HELPid:SB2022072639

Trust: 0.6

db:CS-HELPid:SB2022072522

Trust: 0.6

db:CS-HELPid:SB2022071612

Trust: 0.6

db:CNNVDid:CNNVD-202207-678

Trust: 0.6

db:VULMONid:CVE-2022-32215

Trust: 0.1

db:PACKETSTORMid:175817

Trust: 0.1

db:PACKETSTORMid:178512

Trust: 0.1

db:PACKETSTORMid:168359

Trust: 0.1

sources: VULMON: CVE-2022-32215 // PACKETSTORM: 168305 // PACKETSTORM: 169410 // PACKETSTORM: 168442 // PACKETSTORM: 168358 // PACKETSTORM: 175817 // PACKETSTORM: 178512 // PACKETSTORM: 168359 // CNNVD: CNNVD-202207-678 // JVNDB: JVNDB-2022-013243 // NVD: CVE-2022-32215

REFERENCES

url:https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/

Trust: 2.5

url:https://hackerone.com/reports/1501679

Trust: 2.4

url:https://www.debian.org/security/2023/dsa-5326

Trust: 2.4

url:https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-32215

Trust: 1.5

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/vmqk5l5sbyd47qqz67lemhnq662gh3oy/

Trust: 1.4

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2icg6csib3guwh5dusqevx53mojw7lyk/

Trust: 1.4

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/qcnn3yg2bcls4zekj3clsut6as7axth3/

Trust: 1.4

url:https://access.redhat.com/security/cve/cve-2022-32215

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2icg6csib3guwh5dusqevx53mojw7lyk/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qcnn3yg2bcls4zekj3clsut6as7axth3/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/vmqk5l5sbyd47qqz67lemhnq662gh3oy/

Trust: 1.0

url:https://jvn.jp/vu/jvnvu90782730/

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-017-03

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-32214

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-32212

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-32213

Trust: 0.6

url:https://security.netapp.com/advisory/ntap-20220915-0001/

Trust: 0.6

url:https://packetstormsecurity.com/files/170727/debian-security-advisory-5326-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3505

Trust: 0.6

url:https://packetstormsecurity.com/files/168305/red-hat-security-advisory-2022-6389-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072522

Trust: 0.6

url:https://packetstormsecurity.com/files/168442/red-hat-security-advisory-2022-6595-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168358/red-hat-security-advisory-2022-6449-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4681

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-32215/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072639

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4101

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3673

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4136

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3487

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071827

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3586

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3488

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071612

Trust: 0.6

url:https://packetstormsecurity.com/files/169410/red-hat-security-advisory-2022-6985-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071338

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-32214

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-32213

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-32212

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-33987

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-33987

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-3807

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3807

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-35256

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-43548

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2022:6389

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6985

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29244

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28469

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29244

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7788

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6449

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nodejs/12.22.9~dfsg-1ubuntu3.2

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6491-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nodejs/10.19.0~dfsg-3ubuntu1.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30587

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32006

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22931

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22939

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32558

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30588

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3672

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44532

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35949

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22959

Trust: 0.1

url:https://security.gentoo.org/glsa/202405-29

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22918

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32004

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30584

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7774

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30589

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35948

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35255

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44533

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30582

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3602

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3786

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30590

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30586

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22940

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30581

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37712

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30583

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44531

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37701

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6448

Trust: 0.1

sources: VULMON: CVE-2022-32215 // PACKETSTORM: 168305 // PACKETSTORM: 169410 // PACKETSTORM: 168442 // PACKETSTORM: 168358 // PACKETSTORM: 175817 // PACKETSTORM: 178512 // PACKETSTORM: 168359 // CNNVD: CNNVD-202207-678 // JVNDB: JVNDB-2022-013243 // NVD: CVE-2022-32215

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 168305 // PACKETSTORM: 169410 // PACKETSTORM: 168442 // PACKETSTORM: 168358 // PACKETSTORM: 168359

SOURCES

db:VULMONid:CVE-2022-32215
db:PACKETSTORMid:168305
db:PACKETSTORMid:169410
db:PACKETSTORMid:168442
db:PACKETSTORMid:168358
db:PACKETSTORMid:175817
db:PACKETSTORMid:178512
db:PACKETSTORMid:168359
db:CNNVDid:CNNVD-202207-678
db:JVNDBid:JVNDB-2022-013243
db:NVDid:CVE-2022-32215

LAST UPDATE DATE

2025-12-22T21:33:49.783000+00:00


SOURCES UPDATE DATE

db:CNNVDid:CNNVD-202207-678date:2023-02-01T00:00:00
db:JVNDBid:JVNDB-2022-013243date:2023-09-06T08:23:00
db:NVDid:CVE-2022-32215date:2023-11-07T03:47:46.577

SOURCES RELEASE DATE

db:PACKETSTORMid:168305date:2022-09-08T14:41:32
db:PACKETSTORMid:169410date:2022-10-18T22:30:49
db:PACKETSTORMid:168442date:2022-09-21T13:47:04
db:PACKETSTORMid:168358date:2022-09-13T15:43:41
db:PACKETSTORMid:175817date:2023-11-21T16:00:44
db:PACKETSTORMid:178512date:2024-05-09T15:46:44
db:PACKETSTORMid:168359date:2022-09-13T15:43:55
db:CNNVDid:CNNVD-202207-678date:2022-07-08T00:00:00
db:JVNDBid:JVNDB-2022-013243date:2023-09-06T00:00:00
db:NVDid:CVE-2022-32215date:2022-07-14T15:15:08.387