Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 836659 (CVE-2022-27306)

Summary: net-libs/nodejs: hostname spoofing
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: minor CC: gentoo, williamh
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/nodejs/node/commit/9aeda47d9c
Whiteboard: B4 [??]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-02 17:10:53 UTC
CVE-2022-27306:

The function url.parse() in Node.js v17.7.0 allows attackers to spoof a hostname.

Not many details about this, but there is a fix commit at URL.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-07-08 19:45:19 UTC
https://github.com/nodejs/node/pull/42136#issuecomment-1089980725 says

"There’s no intention of backporting this to LTS releases, it’s a breaking change that has been reverted, and that we are not interested in landing anymore. Snyk report is wrong when it says Node.js 17.7.1 is not affected (it is, we have reverted the fix on that version), and is wrong when it calls it a vulnerability.

FYI that Snyk report is only about the legacy URL parser, if you are using the WHATWG one, you can safely ignore that quirk."

https://github.com/nodejs/node/pull/42136#issuecomment-1090249286 says

"I would also note that this is not a vulnerability. We have analyzed this in great detail and it's not a problem."

The CVE description is now:

"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."