Vulnerability CVE-2012-2330


Published: 2012-08-13   Modified: 2012-08-14

Description:
The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.4/10
4.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Nodejs -> Nodejs 

 References:
https://github.com/joyent/node/commit/c9a231d
https://github.com/joyent/node/commit/7b3fb22
http://www.openwall.com/lists/oss-security/2012/05/08/8
http://www.openwall.com/lists/oss-security/2012/05/08/4
http://secunia.com/advisories/49066
http://blog.nodejs.org/2012/05/04/version-0-6-17-stable/

Copyright 2024, cxsecurity.com

 

Back to Top