7.4

CVE-2021-44531

Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.

Data is provided by the National Vulnerability Database (NVD)
NodejsNode.Js SwEdition- Version < 12.22.9
NodejsNode.Js SwEdition- Version >= 14.0.0 < 14.18.3
NodejsNode.Js SwEdition- Version >= 16.0.0 < 16.13.2
NodejsNode.Js SwEdition- Version >= 17.0.0 < 17.3.1
OracleGraalvm Version20.3.5 SwEditionenterprise
OracleGraalvm Version21.3.1 SwEditionenterprise
OracleGraalvm Version22.0.0.2 SwEditionenterprise
OracleMysql Connectors Version <= 8.0.28
OracleMysql Enterprise Monitor Version <= 8.0.29
OracleMysql Server Version <= 5.7.37
OracleMysql Server Version >= 8.0.0 <= 8.0.28
OracleMysql Workbench Version <= 8.0.28
OracleMysql Cluster Version <= 8.0.29
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.237
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.4 2.2 5.2
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N
CWE-295 Improper Certificate Validation

The product does not validate, or incorrectly validates, a certificate.