Skip to content

Commit c4194c0

Browse files
committed
2022-01-10, Version 17.3.1 (Current)
This is a security release. Notable changes: Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531) - Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly. - Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the `--security-revert` command-line option. - More details will be available at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531 Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532) - Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints. - Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the `--security-revert` command-line option. - More details will be available at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532 Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533) - Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification. - Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable. - More details will be available at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533 Prototype pollution via `console.table` properties (Low)(CVE-2022-21824) - Due to the formatting logic of the `console.table()` function it was not safe to allow user controlled input to be passed to the `properties` parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be `__proto__`. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype. - Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to. - More details will be available at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824 PR-URL: nodejs-private/node-private#311
1 parent f99a2c2 commit c4194c0

File tree

4 files changed

+61
-3
lines changed

4 files changed

+61
-3
lines changed

CHANGELOG.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,8 @@ release.
3333
</tr>
3434
<tr>
3535
<td valign="top">
36-
<b><a href="doc/changelogs/CHANGELOG_V17.md#17.3.0">17.3.0</a></b><br/>
36+
<b><a href="doc/changelogs/CHANGELOG_V17.md#17.3.1">17.3.1</a></b><br/>
37+
<a href="doc/changelogs/CHANGELOG_V17.md#17.3.0">17.3.0</a><br/>
3738
<a href="doc/changelogs/CHANGELOG_V17.md#17.2.0">17.2.0</a><br/>
3839
<a href="doc/changelogs/CHANGELOG_V17.md#17.1.0">17.1.0</a><br/>
3940
<a href="doc/changelogs/CHANGELOG_V17.md#17.0.1">17.0.1</a><br/>

doc/api/crypto.md

+6-2
Original file line numberDiff line numberDiff line change
@@ -2579,7 +2579,9 @@ The SHA-512 fingerprint of this certificate.
25792579
<!-- YAML
25802580
added: v15.6.0
25812581
changes:
2582-
- version: v16.13.2
2582+
- version:
2583+
- v17.3.1
2584+
- v16.13.2
25832585
pr-url: https://github.com/nodejs-private/node-private/pull/300
25842586
description: Parts of this string may be encoded as JSON string literals
25852587
in response to CVE-2021-44532.
@@ -2676,7 +2678,9 @@ The complete subject of this certificate.
26762678
<!-- YAML
26772679
added: v15.6.0
26782680
changes:
2679-
- version: v16.13.2
2681+
- version:
2682+
- v17.3.1
2683+
- v16.13.2
26802684
pr-url: https://github.com/nodejs-private/node-private/pull/300
26812685
description: Parts of this string may be encoded as JSON string literals
26822686
in response to CVE-2021-44532.

doc/api/tls.md

+1
Original file line numberDiff line numberDiff line change
@@ -1462,6 +1462,7 @@ decrease overall server throughput.
14621462
added: v0.8.4
14631463
changes:
14641464
- version:
1465+
- v17.3.1
14651466
- v16.13.2
14661467
- v14.18.3
14671468
- v12.22.9

doc/changelogs/CHANGELOG_V17.md

+52
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88
</tr>
99
<tr>
1010
<td>
11+
<a href="#17.3.1">17.3.1</a><br/>
1112
<a href="#17.3.0">17.3.0</a><br/>
1213
<a href="#17.2.0">17.2.0</a><br/>
1314
<a href="#17.1.0">17.1.0</a><br/>
@@ -36,6 +37,57 @@
3637
* [io.js](CHANGELOG_IOJS.md)
3738
* [Archive](CHANGELOG_ARCHIVE.md)
3839

40+
<a id="17.3.1"></a>
41+
42+
## 2022-01-10, Version 17.3.1 (Current), @BethGriggs
43+
44+
This is a security release.
45+
46+
### Notable changes
47+
48+
#### Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)
49+
50+
Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.
51+
52+
Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the `--security-revert` command-line option.
53+
54+
More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531) after publication.
55+
56+
#### Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)
57+
58+
Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.
59+
60+
Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the `--security-revert` command-line option.
61+
62+
More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532) after publication.
63+
64+
#### Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)
65+
66+
Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.
67+
68+
Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
69+
70+
More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533) after publication.
71+
72+
#### Prototype pollution via `console.table` properties (Low)(CVE-2022-21824)
73+
74+
Due to the formatting logic of the `console.table()` function it was not safe to allow user controlled input to be passed to the `properties` parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be `__proto__`. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.
75+
76+
Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to.
77+
78+
More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824) after publication.
79+
80+
Thanks to Patrik Oldsberg (rugvip) for reporting this vulnerability.
81+
82+
### Commits
83+
84+
* \[[`2a0515f73c`](https://github.com/nodejs/node/commit/2a0515f73c)] - **console**: fix prototype pollution via console.table (Tobias Nießen) [nodejs-private/node-private#307](https://github.com/nodejs-private/node-private/pull/307)
85+
* \[[`2e2c45553d`](https://github.com/nodejs/node/commit/2e2c45553d)] - **crypto,tls**: implement safe x509 GeneralName format (Tobias Nießen) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
86+
* \[[`df3141f59b`](https://github.com/nodejs/node/commit/df3141f59b)] - **src**: add cve reverts and associated tests (Michael Dawson) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
87+
* \[[`5398548746`](https://github.com/nodejs/node/commit/5398548746)] - **src**: remove unused x509 functions (Tobias Nießen) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
88+
* \[[`1f7fdff64a`](https://github.com/nodejs/node/commit/1f7fdff64a)] - **tls**: fix handling of x509 subject and issuer (Tobias Nießen) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
89+
* \[[`b11b4cc69d`](https://github.com/nodejs/node/commit/b11b4cc69d)] - **tls**: drop support for URI alternative names (Tobias Nießen) [nodejs-private/node-private#300](https://github.com/nodejs-private/node-private/pull/300)
90+
3991
<a id="17.3.0"></a>
4092

4193
## 2021-12-17, Version 17.3.0 (Current), @danielleadams

0 commit comments

Comments
 (0)