SB2021022616 - DNS rebinding in nodejs-current (Alpine package)
Published: February 26, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) DNS rebinding (CVE-ID: CVE-2021-22884)
The vulnerability allows a remote attacker to perform DNS rebinding attack.
The vulnerability exists due to the application whitelist includes the “localhost6” name. When “localhost6” is not present in /etc/hosts, it is treated an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=7a9647537833ec55d8ea0d947873965e175eda9d
- https://git.alpinelinux.org/aports/commit/?id=b7f1df7d1931d59c3500ccfa15fc61c94c8a78f5
- https://git.alpinelinux.org/aports/commit/?id=12e2d4bc3143ec726d2977843944b870ec72b671
- https://git.alpinelinux.org/aports/commit/?id=8b10ecbd5f5904ce3ac3cdaa08a6e3736516b92b
- https://git.alpinelinux.org/aports/commit/?id=5bcf64ec3dbba3e15d08fcd817a7173a8c631cca
- https://git.alpinelinux.org/aports/commit/?id=90d22a24cc0fdbe8e7ce05109fbf3bf697f02021