An update for nodejs-qs is now available for openEuler-22.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1404
Final
1.0
1.0
2024-04-12
Initial
2024-04-12
2024-04-12
openEuler SA Tool V1.0
2024-04-12
nodejs-qs security update
An update for nodejs-qs is now available for openEuler-22.03-LTS-SP2.
This is a query string parser for node and the browser supporting nesting, as it was removed from 0.3.x, so this library provides the previous and commonly desired behavior (and twice as fast). Used by express, connect and others.
Security Fix(es):
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).(CVE-2022-24999)
An update for nodejs-qs is now available for openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
nodejs-qs
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1404
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-24999
https://nvd.nist.gov/vuln/detail/CVE-2022-24999
openEuler-22.03-LTS-SP2
nodejs-qs-6.5.1-2.oe2203sp2.noarch.rpm
nodejs-qs-6.5.1-2.oe2203sp2.src.rpm
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has deps: qs@6.9.7 in its release description, is not vulnerable).
2024-04-12
CVE-2022-24999
openEuler-22.03-LTS-SP2
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nodejs-qs security update
2024-04-12
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1404