qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs.7" in its release description, is not vulnerable).
Created breeze-icon-theme tracking bugs for this issue: Affects: epel-8 [bug 2151099] Created golang-github-prometheus tracking bugs for this issue: Affects: epel-7 [bug 2151097] Created nodejs-qs tracking bugs for this issue: Affects: fedora-all [bug 2151103] Created nodejs:13/nodejs tracking bugs for this issue: Affects: epel-8 [bug 2151100] Created qpid-dispatch tracking bugs for this issue: Affects: epel-7 [bug 2151098] Affects: epel-8 [bug 2151101] Created seamonkey tracking bugs for this issue: Affects: epel-8 [bug 2151102]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0050 https://access.redhat.com/errata/RHSA-2023:0050
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-24999
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2023:0612 https://access.redhat.com/errata/RHSA-2023:0612
This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8 Via RHSA-2023:0794 https://access.redhat.com/errata/RHSA-2023:0794
This issue has been addressed in the following products: MTA-6.0-RHEL-8 Via RHSA-2023:0934 https://access.redhat.com/errata/RHSA-2023:0934
This issue has been addressed in the following products: RHOL-5.5-RHEL-8 Via RHSA-2023:0930 https://access.redhat.com/errata/RHSA-2023:0930
This issue has been addressed in the following products: RHOL-5.6-RHEL-8 Via RHSA-2023:0932 https://access.redhat.com/errata/RHSA-2023:0932
This issue has been addressed in the following products: Red Hat Migration Toolkit for Containers 1.7 Via RHSA-2023:1428 https://access.redhat.com/errata/RHSA-2023:1428
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:1533 https://access.redhat.com/errata/RHSA-2023:1533
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:1742 https://access.redhat.com/errata/RHSA-2023:1742
This issue has been addressed in the following products: RHODF-4.12-RHEL-8 Via RHSA-2023:3265 https://access.redhat.com/errata/RHSA-2023:3265
This issue has been addressed in the following products: Red Hat OpenShift Service Mesh 2.2 for RHEL 8 Via RHSA-2023:3645 https://access.redhat.com/errata/RHSA-2023:3645