Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-24822

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-06 Apr, 2022 | 17:15
Updated At-23 Apr, 2025 | 18:41
Rejected At-
Credits

Denial of Service in @podium/layout and @podium/proxy

Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. `@podium/layout`, which is the main way developers/users are vulnerable to this exploit, has been patched in version `4.6.110`. All earlier versions are vulnerable.`@podium/proxy`, which is the source of the vulnerability and is used by `@podium/layout` has been patched in version `4.2.74`. All earlier versions are vulnerable. It is not easily possible to work around this issue without upgrading.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:06 Apr, 2022 | 17:15
Updated At:23 Apr, 2025 | 18:41
Rejected At:
▼CVE Numbering Authority (CNA)
Denial of Service in @podium/layout and @podium/proxy

Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. `@podium/layout`, which is the main way developers/users are vulnerable to this exploit, has been patched in version `4.6.110`. All earlier versions are vulnerable.`@podium/proxy`, which is the source of the vulnerability and is used by `@podium/layout` has been patched in version `4.2.74`. All earlier versions are vulnerable. It is not easily possible to work around this issue without upgrading.

Affected Products
Vendor
podium-lib
Product
proxy
Versions
Affected
  • < 4.6.110
  • < 4.2.74
Problem Types
TypeCWE IDDescription
CWECWE-248CWE-248: Uncaught Exception
Type: CWE
CWE ID: CWE-248
Description: CWE-248: Uncaught Exception
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw
x_refsource_CONFIRM
https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039
x_refsource_MISC
https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf
x_refsource_MISC
https://github.com/podium-lib/layout/releases/tag/v4.6.110
x_refsource_MISC
https://github.com/podium-lib/proxy/releases/tag/v4.2.74
x_refsource_MISC
Hyperlink: https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039
Resource:
x_refsource_MISC
Hyperlink: https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf
Resource:
x_refsource_MISC
Hyperlink: https://github.com/podium-lib/layout/releases/tag/v4.6.110
Resource:
x_refsource_MISC
Hyperlink: https://github.com/podium-lib/proxy/releases/tag/v4.2.74
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw
x_refsource_CONFIRM
x_transferred
https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039
x_refsource_MISC
x_transferred
https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf
x_refsource_MISC
x_transferred
https://github.com/podium-lib/layout/releases/tag/v4.6.110
x_refsource_MISC
x_transferred
https://github.com/podium-lib/proxy/releases/tag/v4.2.74
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/podium-lib/layout/releases/tag/v4.6.110
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/podium-lib/proxy/releases/tag/v4.2.74
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:06 Apr, 2022 | 18:15
Updated At:14 Apr, 2022 | 17:26

Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. `@podium/layout`, which is the main way developers/users are vulnerable to this exploit, has been patched in version `4.6.110`. All earlier versions are vulnerable.`@podium/proxy`, which is the source of the vulnerability and is used by `@podium/layout` has been patched in version `4.2.74`. All earlier versions are vulnerable. It is not easily possible to work around this issue without upgrading.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

finn
finn
>>podium_layout>>Versions before 4.6.110(exclusive)
cpe:2.3:a:finn:podium_layout:*:*:*:*:*:node.js:*:*
finn
finn
>>podium_proxy>>Versions before 4.2.74(exclusive)
cpe:2.3:a:finn:podium_proxy:*:*:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-248Secondarysecurity-advisories@github.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-248
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039security-advisories@github.com
Patch
Third Party Advisory
https://github.com/podium-lib/layout/releases/tag/v4.6.110security-advisories@github.com
Release Notes
Third Party Advisory
https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdfsecurity-advisories@github.com
Patch
Third Party Advisory
https://github.com/podium-lib/proxy/releases/tag/v4.2.74security-advisories@github.com
Release Notes
Third Party Advisory
https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrwsecurity-advisories@github.com
Third Party Advisory
Hyperlink: https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/podium-lib/layout/releases/tag/v4.6.110
Source: security-advisories@github.com
Resource:
Release Notes
Third Party Advisory
Hyperlink: https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/podium-lib/proxy/releases/tag/v4.2.74
Source: security-advisories@github.com
Resource:
Release Notes
Third Party Advisory
Hyperlink: https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw
Source: security-advisories@github.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

52Records found

CVE-2020-5129
Matching Score-4
Assigner-SonicWall, Inc.
ShareView Details
Matching Score-4
Assigner-SonicWall, Inc.
CVSS Score-7.5||HIGH
EPSS-0.51% / 65.50%
||
7 Day CHG~0.00%
Published-26 Mar, 2020 | 03:35
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the SonicWall SMA1000 HTTP Extraweb server allows an unauthenticated remote attacker to cause HTTP server crash which leads to Denial of Service. This vulnerability affected SMA1000 Version 12.1.0-06411 and earlier.

Action-Not Available
Vendor-SonicWall Inc.
Product-sma1000sma1000_firmwareSMA1000
CWE ID-CWE-248
Uncaught Exception
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2019-6829
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.5||HIGH
EPSS-0.37% / 57.88%
||
7 Day CHG~0.00%
Published-17 Sep, 2019 | 19:44
Updated-04 Aug, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-248: Uncaught Exception vulnerability exists in Modicon M580 (firmware version prior to V2.90) and Modicon M340 (firmware version prior to V3.10), which could cause a possible denial of service when writing to specific memory addresses in the controller over Modbus.

Action-Not Available
Vendor-
Product-modicon_m580_firmwaremodicon_m340modicon_m340_firmwaremodicon_m580Modicon M580Modicon M340
CWE ID-CWE-248
Uncaught Exception
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
  • Previous
  • 1
  • 2
  • Next
Details not found