DIVD-2022-00045 - Injection vulnerability found within Socket.io
|Case lead||Ralph Horn|
|Versions||4.x < 4.2.1|
|Recommendation||If you received a notification of a vulnerability, patch your system with the information provided in this notification.|
|Last modified||01 Jun 2023 09:11|
By leveraging the vulnerabilities, an unauthenticated attacker with network access to the application using Socket.io can execute arbitrary system commands.
What you can do
We recommend to use the latest version of Socket.io
What we are doing
- DIVD is currently ensuring that the owners of vulnerable systems are being notified. We do this by scanning for vulnerable hosts, verifying the vulnerability and notifying the owners of these systems. If you receive an email from us regarding this case, the vulnerability has been confirmed.
|29 Apr 2022||Vulnerability discovered by Thomas Rinsma from Codean.|
|25 May 2022||Testing by DIVD conforms that the vulnerabilities are still present in the product.|
|27 Jun 2022||Vendor releases new update and asks us to retest vulnerabilities.|
|13 Jul 2022||We confirm vulnerabilities have been fixed.|
|25 Oct 2022||Limited Disclosure|
|22 Feb 2023||Case closed.|