Description
Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3137-1 | nodejs security update |
Debian DSA |
DSA-5170-1 | nodejs security update |
EUVD |
EUVD-2022-26983 | Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to. |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Netapp
Subscribe
Oncommand Insight
Subscribe
Oncommand Workflow Automation
Subscribe
Snapcenter
Subscribe
Nodejs
Subscribe
Node.js
Subscribe
Oracle
Subscribe
Mysql Cluster
Subscribe
Mysql Connectors
Subscribe
Mysql Enterprise Monitor
Subscribe
Mysql Server
Subscribe
Mysql Workbench
Subscribe
Peoplesoft Enterprise Peopletools
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Openshift Data Foundation
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-04-30T22:24:41.602Z
Reserved: 2021-12-10T00:00:00.000Z
Link: CVE-2022-21824
No data.
Status : Modified
Published: 2022-02-24T19:15:10.080
Modified: 2024-11-21T06:45:30.450
Link: CVE-2022-21824
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD