Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-2216 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
nodejs (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU32332
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2016-2216
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.
MitigationInstall update from vendor's website.
Vulnerable software versionsnodejs (Alpine package): 0.10.20-r0 - 0.10.33-r0
CPE2.3https://git.alpinelinux.org/aports/commit/?id=a1df28931360d38ed8c9fcaba1a1a710908c1a63
https://git.alpinelinux.org/aports/commit/?id=175b1af08edcdb18fcc874a6d375bb7cd623db61
https://git.alpinelinux.org/aports/commit/?id=58bef3151de8d3e10ce83de635f5451e73161b72
https://git.alpinelinux.org/aports/commit/?id=4ededb6392cbab52e5975f83d97eb2669e9c5a6d
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.