cve/2021/CVE-2021-21297.md

21 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-21297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21297)
![](https://img.shields.io/static/v1?label=Product&message=node-red&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=%3C%201.2.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20('Prototype%20Pollution')&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime. The vulnerability is patched in the 1.2.8 release. A workaround is to ensure only authorized users are able to access the editor url.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Lora-net/node-red-contrib-loracloud-utils
- https://github.com/bsunobs-github-io/node-red-contrib-loracloud-utils