{"id":"CVE-2021-44533","details":"Node.js \u003c 12.22.9, \u003c 14.18.3, \u003c 16.13.2, and \u003c 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.","aliases":["BIT-node-2021-44533","BIT-node-min-2021-44533"],"modified":"2026-05-15T12:04:25.935382219Z","published":"2022-02-24T19:15:09.407Z","related":["ALSA-2022:7830","ALSA-2022:9073","SUSE-SU-2022:0101-1","SUSE-SU-2022:0112-1","SUSE-SU-2022:0113-1","SUSE-SU-2022:0114-1","openSUSE-SU-2022:0112-1","openSUSE-SU-2022:0113-1","openSUSE-SU-2024:11730-1","openSUSE-SU-2024:11746-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"11.0"}],"source":"CPE_FIELD","vendor_product":"debian:debian_linux"},{"cpes":["cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql_cluster:8.0.29:*:*:*:*:*:*:*"],"extracted_events":[{"fixed":"8.0.29"},{"last_affected":"8.0.29"}],"source":"CPE_FIELD","vendor_product":"oracle:mysql_cluster"},{"cpes":["cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"8.0.28"}],"source":"CPE_FIELD","vendor_product":"oracle:mysql_connectors"},{"cpes":["cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"8.0.29"}],"source":"CPE_FIELD","vendor_product":"oracle:mysql_enterprise_monitor"},{"cpes":["cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"8.0.28"}],"source":"CPE_FIELD","vendor_product":"oracle:mysql_workbench"},{"cpes":["cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*","cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"8.58"},{"last_affected":"8.59"}],"source":"CPE_FIELD","vendor_product":"oracle:peoplesoft_enterprise_peopletools"}]},"references":[{"type":"ADVISORY","url":"https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220325-0007/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5170"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"EVIDENCE","url":"https://hackerone.com/reports/1429694"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}