Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXhwOWMtODJ4OC03ZjY3
Prototype Pollution in Node-Red
Impact
Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime.
Patches
The vulnerability is patched in the 1.2.8 release.
Workarounds
A workaround is to ensure only authorised users are able to access the editor url.
For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
Acknowledgements
Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
Permalink: https://github.com/advisories/GHSA-xp9c-82x8-7f67JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXhwOWMtODJ4OC03ZjY3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: 8 months ago
CVSS Score: 7.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Identifiers: GHSA-xp9c-82x8-7f67, CVE-2021-21297
References:
- https://github.com/node-red/node-red/security/advisories/GHSA-xp9c-82x8-7f67
- https://github.com/node-red/node-red/releases/tag/1.2.8
- https://www.npmjs.com/package/@node-red/editor-api
- https://www.npmjs.com/package/@node-red/runtime
- https://nvd.nist.gov/vuln/detail/CVE-2021-21297
- https://github.com/advisories/GHSA-xp9c-82x8-7f67
Affected Packages
npm:@node-red/runtime
Versions: < 1.2.8Fixed in: 1.2.8