Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Debian DSA | 
                DSA-4863-1 | nodejs security update | 
  EUVD | 
                EUVD-2021-10017 | Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160. | 
  Ubuntu USN | 
                USN-6418-1 | Node.js vulnerabilities | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-04-30T22:24:31.227Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-22884
No data.
Status : Modified
Published: 2021-03-03T18:15:14.957
Modified: 2024-11-21T05:50:50.180
Link: CVE-2021-22884
                        OpenCVE Enrichment
                    No data.
 Debian DSA
 EUVD
 Ubuntu USN