Information Exposure Affecting node package, versions [6.0.0,6.17.0)[8.0.0,8.15.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
4.43% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UPSTREAM-NODE-173739
  • published28 Feb 2019
  • disclosed26 Feb 2019
  • creditJan Maybach and Marco Pracucci

Introduced: 26 Feb 2019

CVE-2019-1559  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade node to version 6.17.0, 8.15.1 or higher.

Overview

node is a JavaScript runtime built on Chrome's V8 JavaScript engine.

Affected versions of this package are vulnerable to Information Exposure. Under certain circumstances, a TLS server can be forced to respond differently to a client if a zero-byte record is received with an invalid padding compared to a zero-byte record with an invalid MAC. This can be used as the basis of a padding oracle attack to decrypt data.

Only TLS connections using certain ciphersuites executing under certain conditions are exploitable. Node are currently unable to determine whether the use of OpenSSL in Node.js exposes this vulnerability. They are taking a cautionary approach and recommending the same for users.

CVSS Base Scores

version 3.1