Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
0

CVE-2021-22884

Disclosure Date: March 03, 2021
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim’s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
5.9
Exploitability Score:
1.6
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • fedoraproject,
  • netapp,
  • nodejs,
  • oracle,
  • siemens

Products

  • active iq unified manager -,
  • e-series performance analyzer -,
  • fedora 32,
  • fedora 33,
  • fedora 34,
  • graalvm 19.3.5,
  • graalvm 20.3.1.2,
  • graalvm 21.0.0.2,
  • jd edwards enterpriseone tools,
  • mysql cluster,
  • node.js,
  • nosql database,
  • oncommand insight -,
  • oncommand workflow automation -,
  • peoplesoft enterprise peopletools 8.58,
  • peoplesoft enterprise peopletools 8.59,
  • sinec infrastructure network services,
  • snapcenter -
Technical Analysis