Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime. The vulnerability is patched in the 1.2.8 release. A workaround is to ensure only authorized users are able to access the editor url.
References
Link | Resource |
---|---|
https://github.com/node-red/node-red/security/advisories/GHSA-xp9c-82x8-7f67 | Third Party Advisory |
https://www.npmjs.com/package/@node-red/runtime | Release Notes Third Party Advisory |
https://www.npmjs.com/package/@node-red/editor-api | Release Notes Third Party Advisory |
https://github.com/node-red/node-red/releases/tag/1.2.8 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2021-02-26 09:15
Updated : 2022-10-25 08:45
NVD link : CVE-2021-21297
Mitre link : CVE-2021-21297
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
nodered
- node-red