{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2022-24999","title":"Title"},{"category":"description","text":"qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has \"deps: qs@6.9.7\" in its release description, is not vulnerable).","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2022-24999","url":"https://www.suse.com/security/cve/CVE-2022-24999"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"title":"SUSE CVE CVE-2022-24999","tracking":{"current_release_date":"2025-04-25T03:44:13Z","generator":{"date":"2023-10-31T02:22:26Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2022-24999","initial_release_date":"2023-10-31T02:22:26Z","revision_history":[{"date":"2023-10-31T02:22:26Z","number":"2","summary":"Current version"},{"date":"2025-01-01T03:10:36Z","number":"3","summary":"Current version"},{"date":"2025-02-14T07:53:45Z","number":"4","summary":"Current version"},{"date":"2025-02-16T07:35:07Z","number":"5","summary":"Current version"},{"date":"2025-03-15T07:40:09Z","number":"6","summary":"Current version"},{"date":"2025-04-25T03:44:13Z","number":"7","summary":"Current version"}],"status":"interim","version":"7"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Liberty Linux 8","product":{"name":"SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8","product_identification_helper":{"cpe":"cpe:/o:suse:sll:8"}}},{"category":"product_version","name":"nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47","product":{"name":"nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47","product_id":"nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47","product_identification_helper":{"cpe":"cpe:2.3:a:nodejs:node.js:14.21.1:*:*:*:-:*:*:*","purl":"pkg:rpm/suse/nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47@"}}},{"category":"product_version","name":"nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47","product":{"name":"nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47","product_id":"nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47@"}}},{"category":"product_version","name":"nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47","product":{"name":"nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47","product_id":"nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47@"}}},{"category":"product_version","name":"nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47","product":{"name":"nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47","product_id":"nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47@"}}},{"category":"product_version","name":"nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47","product":{"name":"nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47","product_id":"nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47@"}}},{"category":"product_version","name":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","product":{"name":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","product_id":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83@"}}},{"category":"product_version","name":"npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47","product":{"name":"npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47","product_id":"npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47","product_identification_helper":{"purl":"pkg:rpm/suse/npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47@"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47"},"product_reference":"nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47"},"product_reference":"nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47"},"product_reference":"nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47"},"product_reference":"nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47"},"product_reference":"nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83"},"product_reference":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47"},"product_reference":"npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47","relates_to_product_reference":"SUSE Liberty Linux 8"}]},"vulnerabilities":[{"cve":"CVE-2022-24999","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-24999"}],"notes":[{"category":"general","text":"qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has \"deps: qs@6.9.7\" in its release description, is not vulnerable).","title":"CVE description"}],"product_status":{"recommended":["SUSE Liberty Linux 8:nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47"]},"references":[{"category":"external","summary":"CVE-2022-24999","url":"https://www.suse.com/security/cve/CVE-2022-24999"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Liberty Linux 8:nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Liberty Linux 8:nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47","SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47"]}],"threats":[{"category":"impact","date":"2022-11-27T06:00:21Z","details":"important"}],"title":"CVE-2022-24999"}]}