Vulnerability Details : CVE-2018-12116
Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
Products affected by CVE-2018-12116
- cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*
- cpe:2.3:a:suse:suse_enterprise_storage:4:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_openstack_cloud:7:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_openstack_cloud:8:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-12116
0.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-12116
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-12116
-
The product misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.Assigned by: cve-request@iojs.org (Secondary)
References for CVE-2018-12116
-
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
November 2018 Security Releases | Node.jsPatch;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2019:1821
RHSA-2019:1821 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/202003-48
Node.js: Multiple vulnerabilities (GLSA 202003-48) — Gentoo securityThird Party Advisory
Jump to