CVE-2022-2421
Socket.io - Improper type validation in attachment parsing
| CVE | CVE-2022-2421 | |||||||||||
| Title | Socket.io - Improper type validation in attachment parsing | |||||||||||
| Case | DIVD-2022-00045 | |||||||||||
| Credits | 
 | |||||||||||
| Affected products | 
 | |||||||||||
| CVSS | Base score: 
						10
						(CRITICAL) | |||||||||||
| References | 
 | |||||||||||
| Problem type(s) | CWE-89 SQL Injection | |||||||||||
| Date published | 24 Oct 2022 22:00 UTC | |||||||||||
| Last modified | 02 Jan 2024 18:32 UTC | 
Description
			
				Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.
			
		
	
	JSON version.