{"id":"CVE-2021-22884","details":"Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.","aliases":["BIT-node-2021-22884","BIT-node-min-2021-22884"],"modified":"2026-03-01T02:16:57.356992Z","published":"2021-03-03T18:15:14.957Z","related":["ALSA-2021:0734","ALSA-2021:0735","ALSA-2021:0744","MGASA-2021-0092","SUSE-SU-2021:0648-1","SUSE-SU-2021:0649-1","SUSE-SU-2021:0650-1","SUSE-SU-2021:0651-1","SUSE-SU-2021:0673-1","SUSE-SU-2021:0674-1","SUSE-SU-2021:0686-1","SUSE-SU-2021:2620-1","openSUSE-SU-2021:0356-1","openSUSE-SU-2021:0357-1","openSUSE-SU-2021:0372-1","openSUSE-SU-2021:0389-1","openSUSE-SU-2024:11096-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"type":"ADVISORY","url":"https://hackerone.com/reports/1069487"},{"type":"ADVISORY","url":"https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/"},{"type":"ADVISORY","url":"https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210416-0001/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210723-0001/"},{"type":"ADVISORY","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"REPORT","url":"https://hackerone.com/reports/1069487"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"type":"FIX","url":"https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/"},{"type":"FIX","url":"https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160"},{"type":"FIX","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"EVIDENCE","url":"https://hackerone.com/reports/1069487"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"0"},{"fixed":"57679e1c97a90057d5ca9e1f0d1f3c6255d20200"},{"introduced":"2f45ad8060e13d5ac912335096d21526f2f9602b"},{"fixed":"ab8d3c5a1262b4e04c0191a180914555d7c860c3"},{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"fixed":"bd60e93357a118204ea238d94e7a9e4209d93062"},{"introduced":"cf41627411886000429bde058a6594fb7f6d6d47"},{"fixed":"ce800870b4206bafea2942f0b404a7f8f86a8bea"},{"introduced":"d683e3dda09b6b3cc6cad6fd2c106e3061a48f0d"},{"fixed":"7a4f260c5df43caa2f522e739b7cc3e7595d7e09"}]}],"versions":["v10.0.0","v10.1.0","v10.10.0","v10.11.0","v10.12.0","v10.13.0","v10.14.0","v10.14.1","v10.14.2","v10.15.0","v10.15.1","v10.15.2","v10.15.3","v10.16.0","v10.16.1","v10.16.2","v10.16.3","v10.17.0","v10.18.0","v10.18.1","v10.19.0","v10.2.0","v10.2.1","v10.20.0","v10.20.1","v10.21.0","v10.22.0","v10.22.1","v10.23.0","v10.23.1","v10.23.2","v10.23.3","v10.3.0","v10.4.0","v10.4.1","v10.5.0","v10.6.0","v10.7.0","v10.8.0","v10.9.0","v12.0.0","v12.1.0","v12.10.0","v12.11.0","v12.11.1","v12.12.0","v12.13.0","v12.13.1","v12.14.0","v12.14.1","v12.15.0","v12.16.0","v12.16.1","v12.16.2","v12.16.3","v12.17.0","v12.18.0","v12.18.1","v12.18.2","v12.18.3","v12.18.4","v12.19.0","v12.19.1","v12.2.0","v12.20.0","v12.20.1","v12.20.2","v12.3.0","v12.3.1","v12.4.0","v12.5.0","v12.6.0","v12.7.0","v12.8.0","v12.8.1","v12.9.0","v12.9.1","v14.0.0","v14.1.0","v14.10.0","v14.10.1","v14.11.0","v14.12.0","v14.13.0","v14.13.1","v14.14.0","v14.15.0","v14.15.1","v14.15.2","v14.15.3","v14.15.4","v14.15.5","v14.2.0","v14.3.0","v14.4.0","v14.5.0","v14.6.0","v14.7.0","v14.8.0","v14.9.0","v15.0.0","v15.0.1","v15.1.0","v15.2.0","v15.2.1","v15.3.0","v15.4.0","v15.5.0","v15.5.1","v15.6.0","v15.7.0","v15.8.0","v15.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22884.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}