CVE-2022-2421

Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.
References
Link Resource
https://csirt.divd.nl/CVE-2022-2421 Third Party Advisory
https://csirt.divd.nl/DIVD-2022-00045 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*
cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*

History

02 Jan 2024, 19:15

Type Values Removed Values Added
Summary (en) Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object. (en) Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.

07 Nov 2023, 03:46

Type Values Removed Values Added
Summary Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object. Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.

05 Feb 2023, 22:06

Type Values Removed Values Added
References (MISC) https://csirt.divd.nl/DIVD-2022-00045 - (MISC) https://csirt.divd.nl/DIVD-2022-00045 - Third Party Advisory
References (MISC) https://csirt.divd.nl/CVE-2022-2421 - (MISC) https://csirt.divd.nl/CVE-2022-2421 - Third Party Advisory

06 Jan 2023, 16:15

Type Values Removed Values Added
References
  • {'url': 'https://csirt.divd.nl/cases/DIVD-2022-00045', 'name': 'https://csirt.divd.nl/cases/DIVD-2022-00045', 'tags': ['Broken Link'], 'refsource': 'CONFIRM'}
  • {'url': 'https://csirt.divd.nl/cves/CVE-2022-2421', 'name': 'https://csirt.divd.nl/cves/CVE-2022-2421', 'tags': ['Broken Link'], 'refsource': 'CONFIRM'}
  • (MISC) https://csirt.divd.nl/DIVD-2022-00045 -
  • (MISC) https://csirt.divd.nl/CVE-2022-2421 -

28 Oct 2022, 17:48

Type Values Removed Values Added
First Time Socket socket.io-parser
Socket
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:socket:socket.io-parser:*:*:*:*:*:node.js:*:*
References (CONFIRM) https://csirt.divd.nl/cves/CVE-2022-2421 - (CONFIRM) https://csirt.divd.nl/cves/CVE-2022-2421 - Broken Link
References (CONFIRM) https://csirt.divd.nl/cases/DIVD-2022-00045 - (CONFIRM) https://csirt.divd.nl/cases/DIVD-2022-00045 - Broken Link

26 Oct 2022, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-26 10:15

Updated : 2024-01-02 19:15


NVD link : CVE-2022-2421

Mitre link : CVE-2022-2421

CVE.ORG link : CVE-2022-2421


JSON object : View

Products Affected

socket

  • socket.io-parser
CWE
NVD-CWE-noinfo CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')