Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3137-1 nodejs security update
Debian DSA Debian DSA DSA-5170-1 nodejs security update
EUVD EUVD EUVD-2022-26983 Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-04-30T22:24:41.602Z

Reserved: 2021-12-10T00:00:00

Link: CVE-2022-21824

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-24T19:15:10.080

Modified: 2024-11-21T06:45:30.450

Link: CVE-2022-21824

cve-icon Redhat

Severity : Low

Publid Date: 2022-01-10T00:00:00Z

Links: CVE-2022-21824 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses