CVE-2021-22939
nodejs: Incomplete validation of tls rejectUnauthorized parameter
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.
Si la API https de Node.js, era usada incorrectamente y se pasaba "undefined" para el parámetro "rejectUnauthorized", no fue devuelto ningún error y se aceptaban las conexiones a servidores con un certificado caducado.
A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and "undefined" is passed for the "rejectUnauthorized" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.
An update that fixes 5 vulnerabilities is now available. This update for nodejs14 fixes the following issues. Fixed missing input validation on hostnames. Fixed improper handling of untypical characters in domain names. Use after free on close http2 on stream canceling Incomplete validation of rejectUnauthorized parameter. Fixed use after free on close http2 on stream canceling. This update was imported from the SUSE:SLE-15-SP2:Update update project.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-06 CVE Reserved
- 2021-08-16 CVE Published
- 2025-04-30 CVE Updated
- 2025-04-30 First Exploit
- 2025-07-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-295: Improper Certificate Validation
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html | Issue Tracking |
|
https://security.netapp.com/advisory/ntap-20210917-0003 | Third Party Advisory |
|
URL | Date | SRC |
---|---|---|
https://hackerone.com/reports/1278254 | 2025-04-30 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202401-02 | 2024-01-05 | |
https://access.redhat.com/security/cve/CVE-2021-22939 | 2021-09-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1993039 | 2021-09-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 12.0.0 < 12.22.5 Search vendor "Nodejs" for product "Node.js" and version " >= 12.0.0 < 12.22.5" | lts |
Affected
| ||||||
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 14.0.0 < 14.17.5 Search vendor "Nodejs" for product "Node.js" and version " >= 14.0.0 < 14.17.5" | lts |
Affected
| ||||||
Nodejs Search vendor "Nodejs" | Node.js Search vendor "Nodejs" for product "Node.js" | >= 16.0.0 < 16.6.2 Search vendor "Nodejs" for product "Node.js" and version " >= 16.0.0 < 16.6.2" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 20.3.3 Search vendor "Oracle" for product "Graalvm" and version "20.3.3" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 21.2.0 Search vendor "Oracle" for product "Graalvm" and version "21.2.0" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jd Edwards Enterpriseone Tools Search vendor "Oracle" for product "Jd Edwards Enterpriseone Tools" | <= 9.2.6.1 Search vendor "Oracle" for product "Jd Edwards Enterpriseone Tools" and version " <= 9.2.6.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Mysql Cluster Search vendor "Oracle" for product "Mysql Cluster" | <= 8.0.26 Search vendor "Oracle" for product "Mysql Cluster" and version " <= 8.0.26" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Peoplesoft Enterprise Peopletools Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" | 8.57 Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.57" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Peoplesoft Enterprise Peopletools Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" | 8.58 Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.58" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Peoplesoft Enterprise Peopletools Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" | 8.59 Search vendor "Oracle" for product "Peoplesoft Enterprise Peopletools" and version "8.59" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Nextgen Api Search vendor "Netapp" for product "Nextgen Api" | - | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sinec Infrastructure Network Services Search vendor "Siemens" for product "Sinec Infrastructure Network Services" | < 1.0.1.1 Search vendor "Siemens" for product "Sinec Infrastructure Network Services" and version " < 1.0.1.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|